CSO

CSO Update

January 01, 2019

Image: 10 Slack security tools compared

10 Slack security tools compared

Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information. Read more ▶

Your Must Read Stories

•

10 Slack security tools compared

•

Does it matter who the CISO reports to?

•

The 7 deadly sins of endpoint detection & response

•

How to use PowerShell to scan for Windows 10 security updates

•

Review: Using AI to outsmart threats with Vectra Cognito

•

The best IAM software: Rating the top 10 products

•

How to conduct a proper GDPR audit: 4 key steps

Miscellaneous: Hitachi Vantara

Empowering Digital Transformation with Hitachi

Meet the Next-Generation Flash-Powered Cloud Platform. Read more ▶

Image: Does it matter who the CISO reports to?

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: The 7 deadly sins of endpoint detection & response

The 7 deadly sins of endpoint detection & response

Breaches often take weeks or even months to uncover, but the right strategy combined with strong endpoint detection & response (EDR) tools can make all the difference. We examine seven vital factors to consider. Read more ▶

 
 
Image: How to use PowerShell to scan for Windows 10 security updates

How to use PowerShell to scan for Windows 10 security updates

Want to review Windows 10 security updates and patches before installing them? Run this PowerShell command. Read more ▶

Image: Review: Using AI to outsmart threats with Vectra Cognito

Review: Using AI to outsmart threats with Vectra Cognito

Part traffic monitoring tool, part IDS, part SIEM, the Vectra Cognito platform defies classification. Read more ▶

Image: The best IAM software: Rating the top 10 products

The best IAM software: Rating the top 10 products

Based on feedback from IT professionals, these are the best identity and access management products. Download the free PDF report to see how they rank from 1 to 10. Read more ▶

Image: How to conduct a proper GDPR audit: 4 key steps

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take. Read more ▶

Data Sheet: Hitachi Vantara

Hitachi Virtual Storage Platform F Series All-Flash Midrange Cloud Solutions

Modernize your data center with the newest members of the Hitachi Virtual Storage Platform (VSP) family. Read more ▶

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.