CSO

CSO Update

July 16, 2019

Image: Best tools for single sign-on

Best tools for single sign-on

It has been a few years since we last looked at single sign-on products, the field has gotten more crowded and more capable. Read more ▶

Your Must-Read Stories

•

How to close SIEM visibility gaps created by legacy apps

•

What is Magecart? How this hacker group steals payment card data

•

How First Citrus Bank got rid of employee passwords

•

10 penetration testing tools the pros use

•

Review: LogRhythm takes SIEM to the next level

•

Back to basics: What is a computer virus?

eBook: ServiceNow Inc

Service Health With AIOps From ServiceNow

Learn how ServiceNow Event Management uses AIOps to dramatically improve business service availability and performance by mapping business services with accurate service context, intelligently analyzing events, integrating existing monitoring and event management tools, and reducing event volumes. Read more ▶

Image: How to close SIEM visibility gaps created by legacy apps

How to close SIEM visibility gaps created by legacy apps

It's often difficult to make log files and other data from legacy applications accessible to security information and event management systems. Here are some options for improving visibility. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: What is Magecart? How this hacker group steals payment card data

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk. Read more ▶

 
 
Image: How First Citrus Bank got rid of employee passwords

How First Citrus Bank got rid of employee passwords

The Florida bank rolled out passwordless authentication in February that relies on device biometrics of their smartphones. Read more ▶

Image: 10 penetration testing tools the pros use

10 penetration testing tools the pros use

Penetration testing is a simulated cyber attack where professional ethical hackers break into corporate networks to find weaknesses ... before attackers do. Read more ▶

Image: Review: LogRhythm takes SIEM to the next level

Review: LogRhythm takes SIEM to the next level

LogRhythm Enterprise offers a lot of protection and assistance for finding and remediating threats … and sometimes even pre-threat actions. Read more ▶

Image: Back to basics: What is a computer virus?

Back to basics: What is a computer virus?

A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself. Read more ▶

eBook: ServiceNow Inc

Eliminate Business Service Outages By Moving to Service-aware IT Operations

A single outage can be the thread that causes business services to unravel. Can you quickly identify the root cause of an outage and its impact on your business? Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.