CSO

CSO Update

May 30, 2019

Image: 28 DevSecOps tools for baking security into the development process

28 DevSecOps tools for baking security into the development process

Catch and remediate application vulnerabilities earlier and help integrate security in the the development process with these five categories of DevSecOps tools. Read more ▶

Your Must-Read Stories

•

How to automate Let’s Encrypt in AWS using PowerShell

•

5 ways compliance hurts security

•

Why businesses don’t report cybercrimes to law enforcement

•

How to establish your business’s risk tolerance

•

Updating your Spectre, Meltdown mitigations for the Retpoline mitigation

•

Review: FireMon clears the clutter for network security policy management

White Paper: Zscaler

Say Hello to The Software- defined Perimeter (SDP)

While applications are moving to the cloud for scalability and accessibility, many enterprises are still relying on network-centric technologies that were designed when users worked exclusively in the office or connected via VPN. In this paper, ESG discusses its belief that the challenge of using legacy methods in the cloud era will serve as a catalyst for a new user- and application-centric approach to securing internal applications known as the software-defined perimeter (SDP). Read more ▶

Image: How to automate Let’s Encrypt in AWS using PowerShell

How to automate Let’s Encrypt in AWS using PowerShell

You can still automate Let's Encrypt even if your system requires a DNS challenge. Using these PowerShell scripts and Amazon Web Services' DNS service Route 53 will do the trick. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: 5 ways compliance hurts security

5 ways compliance hurts security

The tasks of meeting regulatory requirements and providing true security that actually mitigates risk do not align. Here's how focusing exclusively on compliance can undermine security. Read more ▶

 
 
Image: Why businesses don’t report cybercrimes to law enforcement

Why businesses don’t report cybercrimes to law enforcement

Law enforcement agencies estimate the number of cybercrimes that go unreported by businesses number in the millions. Here why and when you should report breaches and other cyber attacks. Read more ▶

Image: How to establish your business’s risk tolerance

How to establish your business’s risk tolerance

Knowing your business risk appetite allows you to align security efforts to the business needs, prioritizing resources and spending on those areas where organizational leaders have the least appetite for risk. Here's how to do it. Read more ▶

Image: Updating your Spectre, Meltdown mitigations for the Retpoline mitigation

Updating your Spectre, Meltdown mitigations for the Retpoline mitigation

Intel recently released a new mitigation for Spectre and Meltdown and some of their variants. Called Retpoline, it might not be enabled with the Windows 10 1809 update. Here's how to find out and implement. Read more ▶

Image: Review: FireMon clears the clutter for network security policy management

Review: FireMon clears the clutter for network security policy management

A pioneer in the field of network security policy management, FireMon provides full visibility into networks and devices, and overlays that knowledge with the rules, platforms, hardware and programs designed to protect it. Read more ▶

White Paper: CDW Corporation

Transforming the Customer Experience

Digital transformation is more than technology. It’s how that technology is harnessed to improve business models, to improve operational efficiency and revolutionize the customer experience. And that’s just the beginning. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.