Multi-cloud security challenges, and how to build a strategy

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Oct 23, 2018
Featured Image
INSIDER

10 top security enhancements in Windows Server 2019

This new version of Windows Server offers several significant security upgrades over Server 2016, including tools to track ransomware and other malware, and to track lateral movement attacks. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Multi-cloud security challenges, and how to build a strategy
3 ways politicians could prevent voting machines from being hacked (if they wanted to)
Top cloud security controls you should be using
The types of cyber attack you're most likely to face
17 penetration testing tools the pros use
Signs you've been hit with an advanced persistent threat (APT)
Thumbnail Image
INSIDER

Multi-cloud security challenges, and how to build a strategy

A number of security best practices have emerged alongside the growth of the multi-cloud environment, security experts say, and there are several critical steps that all organizations should take as they develop their own security strategies. Read More

Thumbnail Image
INSIDER

3 ways politicians could prevent voting machines from being hacked (if they wanted to)

The current state of voting security is laughably bad, but we know how to secure voting machines. The problem isn't technical, but a lack of political will. Read More

Thumbnail Image

Top cloud security controls you should be using

Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind to secure your cloud workloads. Read More

Thumbnail Image
INSIDER

The types of cyber attack you're most likely to face

Don't be distracted by the exploit of the week. Invest your time and money defending against the threats you're apt to confront. Read More

Thumbnail Image

17 penetration testing tools the pros use

We asked a few professional hackers for their thoughts on the best pen testing tools. Here's what they said. Read More

Thumbnail Image

Signs you've been hit with an advanced persistent threat (APT)

Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack Read More

Editor’s Picks

1. 10 essential enterprise security tools (and 11 nice-to-haves)
2. 5 hard truths every CISO should know
3. The Options Clearing Corporation taps AI to stay ahead of hackers
4. What is security’s role in digital transformation?
5. What is an RDP attack? 7 tips for mitigating your exposure
6. Are long passphrases the answer to password problems?
7. 5 cyber security basics you can't afford to ignore

Get Security Smart

Forty-four percent of respondents to the 2017 Global State of Information Security Survey cited employee awareness and cooperation as their top security challenge. We can help. From the editors of CSO, Security Smart is a quarterly security awareness newsletter ready for distribution in your organization. Subscribe now and arm your employees with the information they need to be more secure at home and at work. Learn more.
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.