CSO

CSO Daily

August 20, 2019

Image: How to market security: 8 tips for recruiting users to your cause

How to market security: 8 tips for recruiting users to your cause

Getting users to care about security is a much-lamented challenge. What you need is a marketing plan. Read more ▶

Your Must-Read Stories

•

How much should you spend on security?

•

Taxpayer First Act: Improving identity verification and modernizing the IRS

•

Are you being tracked through a Bluetooth security vulnerability?

•

Built to scale: 5 tips for structuring your security organization for growth

•

Developing personal OPSEC plans: 10 tips for protecting high-value targets

•

The best and worst of Black Hat 2019

Miscellaneous: Citrix

Build & Grow with Citrix Ready

Citrix ready is a technology partner program that showcases verified products trusted to enhance Citrix solutions. Check out more here. Read more ▶

Image: How much should you spend on security?

How much should you spend on security?

Each organization needs to develop its own ongoing process for evaluating needs and justifying security spend. Here's how two CISOs do it. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Taxpayer First Act: Improving identity verification and modernizing the IRS

Taxpayer First Act: Improving identity verification and modernizing the IRS

With citizens' PII at risk, some federal agencies like the IRS are moving away from knowledge-based verification. It's time for them all to follow suit. Read more ▶

 
 
Image: Are you being tracked through a Bluetooth security vulnerability?

Are you being tracked through a Bluetooth security vulnerability?

The Bluetooth protocol, which was never that secure to begin with, now allows the bad guys to track your location on some laptops and phones, but worse could be the entry it offers into the IoT. Read more ▶

Image: Built to scale: 5 tips for structuring your security organization for growth

Built to scale: 5 tips for structuring your security organization for growth

How to prepare your SOC for mergers, new business innovation and a constantly changing and growing attack surface. Read more ▶

Image: Developing personal OPSEC plans: 10 tips for protecting high-value targets

Developing personal OPSEC plans: 10 tips for protecting high-value targets

Attackers are increasingly targeting executives and employees who have access to sensitive enterprise data. Here's how to protect those individuals with personal OPSEC plans. Read more ▶

Image: The best and worst of Black Hat 2019

The best and worst of Black Hat 2019

Security rock stars? Fake science? This year's Black Hat had it all. Read more ▶

White Paper: Citrix

Citrix Ready, Set & Go! Customer satisfaction, confidence & marketshare

The Citrix Ready Program brings together Citrix verified products of our partners that enhance Citrix solutions. To your customer, the Citrix Ready designation represents the confidence and trust that comes with compatibility and partnership. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].