CSO

CSO Daily

May 06, 2019

Image: FINRA Rule 4512: U.S. SEC approves electronic signatures

FINRA Rule 4512: U.S. SEC approves electronic signatures

The updated FINRA Rule 4512(a)(3) is now in effect, striking a blow against outdated regulations. Read more ▶

Your Must-Read Stories

•

Public SAP exploits could enable attacks against thousands of companies

•

How (and why) to build digital trust

•

Evaluating SOC-as-a-service providers

•

How Akamai implemented a zero-trust model

•

Why unauthenticated SMS is a security risk

•

Security Recruiter Directory

eGuide: BridgeTek Solutions, an HP Silver Partner

How HP Elite PCs Guard Against Evolving Cyberattacks

Read this guide to learn how HP Elite PCs — equipped with HP Compute Security Solutions — combat malware, PC BIOS attacks, and other cyberthreats in real time. Read more ▶

Image: Public SAP exploits could enable attacks against thousands of companies

Public SAP exploits could enable attacks against thousands of companies

A recently released exploit takes advantage of a known configuration vulnerability that persists among many on-premise and cloud SAP instances. Here's what companies using SAP should do. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: How (and why) to build digital trust

How (and why) to build digital trust

Earning customers' trust translates to better customer acquisition, greater customer loyalty and more revenue. Download this FREE digital issue of CSO magazine to learn how to do it. Read more ▶

 
 
Image: Evaluating SOC-as-a-service providers

Evaluating SOC-as-a-service providers

Not every organization that needs a security operations center can afford to equip and staff one. A number of providers provide SOC as a service. Here's what you need to know about them. Read more ▶

Image: How Akamai implemented a zero-trust model

How Akamai implemented a zero-trust model

An effort that was triggered by a nation-state attack nine years ago has fundamentally transformed how people and devices access apps and services, limiting damage from lateral movement. Read more ▶

Image: Why unauthenticated SMS is a security risk

Why unauthenticated SMS is a security risk

Multifactor authentication that uses SMS messaging as a second factor is vulnerable to simple hacks. User education is the best defense. Read more ▶

Image: Security Recruiter Directory

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop. Read more ▶

White Paper: VeloCloud

SD-WAN Migration Strategies for Varying Network Architectures

This paper covers the migration design thought process,routing considerations, and a step-by-step migration path to insert your traditional WAN sites into an SD-WAN architecture. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].