CSO

CSO Update

July 02, 2019

Image: 6 signs the CIO-CISO relationship is broken — and how to fix it

6 signs the CIO-CISO relationship is broken — and how to fix it

Successful collaboration between the IT and security leaders is essential but not always easy. Here are signs the relationship is broken – and 8 steps you should take to fix it. Read more ▶

Your Must-Read Stories

•

The dirty dozen: 12 top cloud security threats

•

Review: LogRhythm takes SIEM to the next level

•

Buying an ICS / OT security monitoring tool? Ask these questions first

•

What is a Trojan horse? How this tricky malware works

•

How to disable basic authentication in Microsoft Office 365

•

6 ways malware can bypass endpoint protection

eBook: Flexera

eBook: Don't Let Bad Data Derail Good IT Decisions

New eBook: How to get insights from your IT asset management Read more ▶

Image: The dirty dozen: 12 top cloud security threats

The dirty dozen: 12 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Review: LogRhythm takes SIEM to the next level

Review: LogRhythm takes SIEM to the next level

LogRhythm Enterprise offers a lot of protection and assistance for finding and remediating threats … and sometimes even pre-threat actions. Read more ▶

 
 
Image: Buying an ICS / OT security monitoring tool? Ask these questions first

Buying an ICS / OT security monitoring tool? Ask these questions first

Shopping for an ICS / OT monitoring solution? Here's what you need to know about evaluating the vendors. Read more ▶

Image: What is a Trojan horse? How this tricky malware works

What is a Trojan horse? How this tricky malware works

A Trojan horse is a type of malware that can wreak havoc on computer networks — but only with your unwitting help. Read more ▶

Image: How to disable basic authentication in Microsoft Office 365

How to disable basic authentication in Microsoft Office 365

If you've implemented multi-factor authentication, you should disable the default basic authentication to make sure attackers can't exploit it. Read more ▶

Image: 6 ways malware can bypass endpoint protection

6 ways malware can bypass endpoint protection

Breaches from attacks that defeat or run around endpoint protection measures are on the rise. Here's how attackers do it. Read more ▶

White Paper: LucidWorks

4 AI Quick Hits You Can Add to Your Enterprise Search App Right Now

Lucidworks has out-of-the-box functionality available that you can add to your application with little to no extra code. If you’re not already using Fusion, the average implementation time for building a Fusion app is not very long. It’s time to get more value out of your data and accelerate your employees. It is time for Fusion. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.