CSO

CSO Daily

June 24, 2019

Image: 4 security concerns for low-code and no-code development

4 security concerns for low-code and no-code development

Low code does not mean low risk. By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide problems from security. Read more ▶

Your Must-Read Stories

•

OpenSSH to protect keys in memory against side-channel attacks

•

Free Course: Learn to install and Configure Splunk

•

3 email security protocols that help prevent address spoofing: How to use them

•

How to prepare a SOC-as-a-service RFP

•

8 steps to make sure Microsoft Windows 10 1903 is ready for deployment

•

6 signs the CIO-CISO relationship is broken — and how to fix it

White Paper: OutSystems, Inc.

Holistic Mandate: Retail Banks Must Shift Focus to Fulfill Digital Promise

A focus on customers is good, no doubt. But not at the expense of critical infrastructure. That’s the state of many retail banks, IDG and Outsystems research shows. In this white paper, discover why investing in middle-office applications is key to providing a flexible, scalable core. Read more ▶

Image: OpenSSH to protect keys in memory against side-channel attacks

OpenSSH to protect keys in memory against side-channel attacks

The new OpenSSH patch makes it harder to execute attacks such as Spectre, Meltdown, Rowhammer and Rambleed. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Free Course: Learn to install and Configure Splunk

Free Course: Learn to install and Configure Splunk

In partnership with tech training provider PluralSight, CSO is offering free, limited-time access to the course “Installing and Configuring Splunk.” Read more ▶

 
 
Image: 3 email security protocols that help prevent address spoofing: How to use them

3 email security protocols that help prevent address spoofing: How to use them

DMARC, DKIM and SPF will help cut down on malicious emails from spoofed addresses. Setting them up is easier than you think. Read more ▶

Image: How to prepare a SOC-as-a-service RFP

How to prepare a SOC-as-a-service RFP

Here's how one company structured its SOCaaS request for proposal document. Key takeaway: Don't be afraid to ask for too many details. Read more ▶

Image: 8 steps to make sure Microsoft Windows 10 1903 is ready for deployment

8 steps to make sure Microsoft Windows 10 1903 is ready for deployment

Follow these steps to identify problems that might crop up when you update to the Windows 10 1903 release. Read more ▶

Image: 6 signs the CIO-CISO relationship is broken — and how to fix it

6 signs the CIO-CISO relationship is broken — and how to fix it

Successful collaboration between the IT and security leaders is essential but not always easy. Here are signs the relationship is broken – and 8 steps you should take to fix it. Read more ▶

White Paper: BMC Software

Automate Cloud & DevOps Initiatives Across All Phases

DevOps and cloud computing get so much enterprise attention and investment today, it’s easy to forget the important fact that they are a means to an end. Businesses are not reorganizing software development operations and redesigning IT infrastructures for the sake of change. The end goal is to innovate faster. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.