CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

October 29, 2020

14 controls for securing SAP systems in the cloud

Organizations often don't follow security best practices when deploying and managing complex SAP systems. This set of security controls from the Cloud Security Alliance aims to change that. Read more ▶

Image: Sponsored by Red Hat: Today, you can read premium IDG content for free. It’s on us.

Sponsored by Red Hat: Today, you can read premium IDG content for free. It’s on us.

When content is freely available, more people can access information and make better informed decisions. Here’s to open access, open source, and to the new possibilities that occur when we honor transparency, collaboration, and inclusivity.

Supply chain attacks explained: Why third-party providers may be your weakest link

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

CISM certification guide: Requirements, prerequisites, and cost

Certified Information Security Manager, or CISM, is a certification for advanced IT professionals who want to demonstrate that they can develop and manage an infosec program at the enterprise level.

Windows 10 security: Are you on the right version?

If you're running an older version of Windows 10, It's time to review security enhancements that later versions offer to see if you need to update.

The Windows Bad Neighbor vulnerability explained — and how to protect your network

Attackers could use the Windows Bad Neighbor vulnerability to perform remote code execution or create buffer overflows. Patches and workarounds are available.

7 steps to ensure a successful CISO transition

CISOs can play a critical role transitioning their replacements to the job and build a great reputation in the process. Follow this advice to ensure security operations don't miss a beat.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701