CSO

CSO Update

October 29, 2019

Image: What will it take to finally care about printer security?

What will it take to finally care about printer security?

Despite shipping with mature security features, most printer deployments are insecure because of misplaced financial and organizational incentives. Read more ▶

Your Must-Read Stories

•

The security staffing problem isn't going away. Now what?

•

Review: How Avanan defends cloud-based email platforms

•

Cell phones don't belong in SCIFs, says Republican congressman

•

China’s MLPS 2.0: Data grab or legitimate attempt to improve domestic cybersecurity?

•

Compliance mandates, cybersecurity best practices dominate 2019 security priorities

•

Third party risk management: A getting started guide

Video/Webcast: Interana

Making Real-Time Analytics Happen With Little Manual Effort

Real-time analytics isn’t easy for every company. But CloudBees has made adding new events for tracking a breeze. And they’ve automated the process of collecting the insight and making it accessible to the right internal users. Join us for this live webinar to hear the lessons learned and what helped them succeed. Read more ▶

Image: The security staffing problem isn't going away. Now what?

The security staffing problem isn't going away. Now what?

6 strategies and tactics to adjust to a future characterized by higher levels of both vacancy and turnover. Read more ▶

Image: This 4-course VMware mastery bundle is on sale today for just $20

DEALPOST

This 4-course VMware mastery bundle is on sale today for just $20

The Ultimate VMware Mastery Bundle features 4 courses on virtualization concepts and how to deploy VMware. Read more ▶

Image: Review: How Avanan defends cloud-based email platforms

Review: How Avanan defends cloud-based email platforms

Avanan can catch the advanced threats that Microsoft, Google or other cloud-based email providers miss, identifying dangers like phishing, malware, data leakage and even full account takeovers. Read more ▶

 
 
Image: Cell phones don't belong in SCIFs, says Republican congressman

Cell phones don't belong in SCIFs, says Republican congressman

Rep. Mike Rogers says his phone was infected by Russian malware three years ago. Also, why he believes we need fewer federal cybersecurity agencies and election laws. Read more ▶

Image: China’s MLPS 2.0: Data grab or legitimate attempt to improve domestic cybersecurity?

China’s MLPS 2.0: Data grab or legitimate attempt to improve domestic cybersecurity?

The new version China’s Multi-Level Protection Scheme (MLPS) expands what companies fall under its purview and lower the threshold for government inspection. Should companies with operations in China be concerned? Read more ▶

Image: Compliance mandates, cybersecurity best practices dominate 2019 security priorities

Compliance mandates, cybersecurity best practices dominate 2019 security priorities

IDG's Security Priorities Study shows most organizations' security efforts are driven by compliance requirements and efforts to improve security best practices. Read more ▶

Image: Third party risk management: A getting started guide

Third party risk management: A getting started guide

Your vendor partners may be your organization's weakest link. Without a strong third party risk management program in place, how would you know? Read more ▶

White Paper: Cohesity

The Forrester Wave™: Data Resiliency Solutions, Q3 2019

This report shows how each provider measures up and helps infrastructure and operations (I&O) professionals select the right one for their needs. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as [email protected].
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].