Blockchain vendors are touting the technology as a solution to many security (and other) problems. Consider costs and alternatives before jumping on the bandwagon. Read More ▶ |
|
| White Paper: Silver Peak Systems Inc Today, most WAN traffic, to and from branch and remote sites, is destined for the cloud, either to SaaS services or applications hosted in an IaaS environment. The traditional WAN was architected for branch-to-data-center traffic flows, not to efficiently support new cloud-driven traffic patterns. Read More ▶ | A positivity campaign raised security awareness — and improved performance — at Finning International. Read More ▶ |
| The General Data Protection Regulation (GDPR) puts the onus on organizations to better manage and personal data. But do they know where to find it? We list the areas most likely to be overlooked. Read More ▶ |
| | CSO is conducting its annual Security Priorities survey, and we invite you to participate. It will take no more than 10 minutes of your time and you can enter a sweepstakes to win a $500 cash prize. Read More ▶ |
| Cloud Defender is a user-friendly tool that lets local IT staff inspect their cloud deployments to look for evidence of hidden threats or breaches. But it can also be used in a SaaS model, with the cybersecurity team at Alert Logic taking over most cloud-based cybersecurity functions. Read More ▶ |
| Here's how the world's two most popular desktop OSes keep systems and data safe from malware, unauthorized access, hardware exploits and more. Read More ▶ |
| Any of these tools from Endgame, Red Canary, Mitre, and Uber will get your red team and pentesters started with Mitre's ATT&CK framework. Read More ▶ |
| eBook: Silver Peak Systems Inc With the right SD-WAN solution, broadband internet service are secure enough for the enterprise. Read this eBook to learn six ways to use a secure SD-WAN solution to improve network security and compliance. Read More ▶ | CSO Insider | Editor's Picks |
|
|
|