CSO

CSO Update

June 30, 2019

Image: 10 essential steps to improve your security posture

10 essential steps to improve your security posture

A strong security posture takes more than having the right defenses in place, you also need to establish solid plans to ensure you react to any breach in the right way. Read more ▶

Your Must-Read Stories

•

Is the digital identity layer missing or just misplaced?

•

12 top web application firewalls compared

•

5 signs you've been hit with an APT

•

What is a botnet? When armies of infected IoT devices attack

•

4 tips to mitigate Slack security risks

•

Security Recruiter Directory

eGuide: AMAZON WEB SERVICES

The CIO as Business Leader

This e-Guide is dedicated to giving CIOs the tools they need to thrive as business leaders. Read more ▶

Image: Is the digital identity layer missing or just misplaced?

Is the digital identity layer missing or just misplaced?

The orchestration of existing services and data could provide a digital identity layer that gives the internet a common way to handle identity for all consumers. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: 12 top web application firewalls compared

12 top web application firewalls compared

A web application firewall (WAF) is a critical component of an enterprise security infrastructure, providing a key security layer for web-facing applications and APIs. Read more ▶

 
 
Image: 5 signs you've been hit with an APT

5 signs you've been hit with an APT

An advanced persistent threat (APT) is a cyberattack executed by criminals or nation-states with the intent to steal data or surveil systems over an extended time period. Here's how to know if you've been hit with one. Read more ▶

Image: What is a botnet? When armies of infected IoT devices attack

What is a botnet? When armies of infected IoT devices attack

A botnet is a collection of internet-connected devices that an attacker has compromised. Commonly used in distributed denial of service (DDoS) attacks, botnets can also take advantage of their collective computing power to send large volumes of spam, steal credentials at scale, or spy on people and organizations. Read more ▶

Image: 4 tips to mitigate Slack security risks

4 tips to mitigate Slack security risks

A Slack breach would be a nightmare in terms of exposed sensitive data. Here's how to lock down your Slack workspaces. Read more ▶

Image: Security Recruiter Directory

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop. Read more ▶

White Paper: ActiveState

Python Modernization: 2 To 3

Python 2 will soon be unsupported. This paper discusses your options for moving your existing packages and applications from Python 2 to 3, along with best practice guidelines. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.