CSO

CSO Update

June 11, 2019

Image: 6 ways malware can bypass endpoint protection

6 ways malware can bypass endpoint protection

Breaches from attacks that defeat or run around endpoint protection measures are on the rise. Here's how attackers do it. Read more ▶

Your Must-Read Stories

•

Review: LogRhythm takes SIEM to the next level

•

How to use Azure Automation to issue Let's Encrypt certificates

•

Why unauthenticated SMS is a security risk

•

12 tips for effectively presenting cybersecurity to the board

•

Coventry University puts security at the heart of its cloud-first strategy

•

How a data-driven approach to security helps a small healthcare team embrace automation

Video/Webcast: Pulse Secure

2019 State of Enterprise Secure Access; enabling multi-cloud and Zero Trust

Join this IDG research-based webcast and to understand the extent of hybrid IT secure access challenges, threats, initiatives, practices and technologies. Read more ▶

Image: Review: LogRhythm takes SIEM to the next level

Review: LogRhythm takes SIEM to the next level

LogRhythm Enterprise offers a lot of protection and assistance for finding and remediating threats … and sometimes even pre-threat actions. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: How to use Azure Automation to issue Let's Encrypt certificates

How to use Azure Automation to issue Let's Encrypt certificates

Use Azure Automation with the Let's Ecrypt free certificate authority to create, validate and install certificates on a firewall. Read more ▶

 
 
Image: Why unauthenticated SMS is a security risk

Why unauthenticated SMS is a security risk

Multifactor authentication that uses SMS messaging as a second factor is vulnerable to simple hacks. User education is the best defense. Read more ▶

Image: 12 tips for effectively presenting cybersecurity to the board

12 tips for effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more ▶

Image: Coventry University puts security at the heart of its cloud-first strategy

Coventry University puts security at the heart of its cloud-first strategy

The school goes cloud-first but aims to lead its sector when it comes to cybersecurity. Read more ▶

Image: How a data-driven approach to security helps a small healthcare team embrace automation

How a data-driven approach to security helps a small healthcare team embrace automation

Not-for-profit Martin's Point Health Care created a data-driven security framework to automate how threats are evaluated. Read more ▶

Miscellaneous: Splunk

The Present and Future of Security Operations

Learn about the technologies, processes, and trends that may help CISOs overcome today's security operations challenges and develop a well-organized and operative future-oriented strategy. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].