CSO

CSO Daily

November 06, 2019

Image: What CIOs want from CISOs: Collaboration and no finger pointing

What CIOs want from CISOs: Collaboration and no finger pointing

Two CIOs explain how they view their relationships with the security function, and why CISOs need to collaborate closely with CIOs whether they report into them or not. Read more ▶

Your Must-Read Stories

•

Defenders can discover phishing sites through web analytics IDs

•

Boeing's poor information security posture threatens passenger safety, national security, researcher says

•

5 keys to protect your supply chain from cyberattacks

•

US Department of Justice push for encryption backdoors might run afoul of First Amendment

•

What you need to know about the US CLOUD Act and the UK COPOA Act

•

What security companies – and all of us – can learn from the Deadspin debacle

Case Study: Finger Food Advanced Technology Group

Retail Digital Transformation Case Study

Using Virtual Reality to help people access a new paradigm of mindfulness Read more ▶

Image: Defenders can discover phishing sites through web analytics IDs

Defenders can discover phishing sites through web analytics IDs

Many phishing websites are now using unique user IDs (UIDs), and that gives defenders a signal to detect phishing attacks before they do much damage. Read more ▶

Image: Prepare for the CompTIA certification exams with this $69 training bundle

DEALPOST

Prepare for the CompTIA certification exams with this $69 training bundle

The Complete 2019 CompTIA Certification Training Bundle features 12 prep courses on CompTIA's most useful certifications. Read more ▶

Image: Boeing's poor information security posture threatens passenger safety, national security, researcher says

Boeing's poor information security posture threatens passenger safety, national security, researcher says

The aircraft maker failed to perform minimum due diligence in securing its networks, then tried to cover it up, security researcher Chris Kubecka tells Aviation Cyber Security conference attendees. Read more ▶

 
 
Image: 5 keys to protect your supply chain from cyberattacks

5 keys to protect your supply chain from cyberattacks

The SANS Institute recently identified the key components to keep your supply chain secure. Here's why industry experts believe they are important. Read more ▶

Image: US Department of Justice push for encryption backdoors might run afoul of First Amendment

US Department of Justice push for encryption backdoors might run afoul of First Amendment

Is encryption code speech? Earlier court rulings suggest that it is, legally, and therefore subject to First Amendment protections. Read more ▶

Image: What you need to know about the US CLOUD Act and the UK COPOA Act

What you need to know about the US CLOUD Act and the UK COPOA Act

A new data access agreement between the UK and US streamlines law enforcement’s ability to gain access to data held on foreign soil. Read more ▶

Image: What security companies – and all of us – can learn from the Deadspin debacle

What security companies – and all of us – can learn from the Deadspin debacle

The recent news of the exodus of the entire editorial staff of the popular sports and culture website Deadspin sent reverberations throughout the media. But two of the biggest lessons to be learned from Deadspin’s downfall should resonate with leaders and employees of any company, in any industry. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].