CSO

CSO Update

July 11, 2019

Image: How CISOs become business leaders

How CISOs become business leaders

Security leaders need to master marketing, HR, business lingo and more to really help lead their organizations, says William Hill’s group CISO. Read more ▶

Your Must-Read Stories

•

Secure elections scorecard: Grading the candidate and Congressional proposals

•

How to set up Microsoft Cloud App Security

•

How CISA protects critical infrastructure from cyber threats

•

Safely deploying TLS certificates: 5 common mistakes to avoid

•

‘Stranger Things,’ data provenance, intelligent systems and data conversion

•

Must-have features in a modern network security architecture

eBook: ServiceNow Inc

Now on Now Story: Taking Charge of ServiceNow’s IT Project Portfolio

In this eBook, we explain the ServiceNow® IT Business Management (ITBM) journey–how we’ve transformed the way we manage our IT project portfolio to deliver predictable, high-value business outcomes. Read more ▶

Image: Secure elections scorecard: Grading the candidate and Congressional proposals

Secure elections scorecard: Grading the candidate and Congressional proposals

After 2016's election security debacle, there's a push to secure America's electronic voting infrastructure. Some of the proposals are good. Others fall short. CSO investigates. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: How to set up Microsoft Cloud App Security

How to set up Microsoft Cloud App Security

Microsoft's Cloud App Security add-on will alert you to suspicious sign-in activity in Office 365, Azure and other cloud apps using standard templates or custom policies. Read more ▶

 
 
Image: How CISA protects critical infrastructure from cyber threats

How CISA protects critical infrastructure from cyber threats

The Cybersecurity and Infrastructure Security Agency (CISA) is a new federal agency, created to protect the nation's critical infrastructure. Read more ▶

Image: Safely deploying TLS certificates: 5 common mistakes to avoid

Safely deploying TLS certificates: 5 common mistakes to avoid

A properly configured TLS cert is the first layer of defense for data in transit. Here are some tips to ensure a secure deployment. Read more ▶

Image: ‘Stranger Things,’ data provenance, intelligent systems and data conversion

‘Stranger Things,’ data provenance, intelligent systems and data conversion

Season 3 of “Stranger Things” takes us back to 1985 in Hawkins, Indiana, and the magic of the Starcourt Mall. An underlying theme of this show is how the side effects of technology research can lead to adverse consequences. This month, we’ll take a look at how the balkanized approach to healthcare led to numerous data sources and processes that did not promote interoperability and hindered security. Read more ▶

Image: Must-have features in a modern network security architecture

Must-have features in a modern network security architecture

Form factors and use cases are changing, so network security must be more comprehensive, intelligent, and responsive than ever before. Read more ▶

eBook: Base2 Solutions

Case Study Ebook: Stories of Digital Innovation

Digital Innovation (DI) can provide meaningful impacts for businesses of all types – companies looking for a competitive edge need to embrace DI. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].