Review: Seceon soups up standard SIEM

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jun 05, 2018
Featured Image

Getting security ‘right’

We love to talk about doing things right, there is no such things as doing it right. Perfect is the enemy of good and also of modern infrastructure. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Review: Seceon soups up standard SIEM
$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert
How to evaluate web authentication methods
Does your security solution protect against GDPR non-compliance?
Facebook gave access to data on users and their friends to 60 device makers

Video/Webcast: Citrix Systems Inc

Chrome OS & Citrix: Simplify Endpoint Management and VDI Strategy

According to SIM IT Trends survey, 2017, Security/Cybersecurity/Privacy remains the second biggest business concern (only behind Alignment of IT and/with the Business) and the most worrisome personal concern of IT managers. Read More

Thumbnail Image
INSIDER

Review: Seceon soups up standard SIEM

The Open Threat Management Platform essentially acts as both an SIEM and a frontline security appliance. Thrifty firms may want to consider eliminating some of their other cybersecurity programs if they duplicate what the OTM is doing, especially if the OTM is consistently catching what they miss. Read More

Thumbnail Image
DealPost

$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert

Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More

Thumbnail Image

How to evaluate web authentication methods

Authentication evaluation white paper includes popular and obscure methods and outlines a framework for assessing their security effectiveness. Read More

Thumbnail Image

Does your security solution protect against GDPR non-compliance?

Despite a seemingly complete overhaul of data security and privacy as the General Data Protection Regulation rolled out, many fall short when screening for compliance. How do you protect your organization, your clients and your customers? Read More

Thumbnail Image

Facebook gave access to data on users and their friends to 60 device makers

Facebook may have violated a settlement with the FTC and promises made to users, as well as lied to Congress over giving users' complete control of their data. Read More

Video/Webcast: Software AG

Saving Millions with a Better View of Your IT Infrastructure

You need to deliver on your digital strategy, but how do you gain enough control and oversight of your IT infrastructure to identify the necessary savings? In this short presentation, you'll hear how Software AG's Alfabet IT Transformation Platform (ranked #1 by Gartner and Forrester) has helped many of the world's largest companies save millions in IT costs. Read More

CSO Insider

1. 8 hot cyber security trends (and 4 going cold)
2. 11 tips to prevent phishing
3. Sample computer and e-mail usage policy
4. State of Cybercrime: Security events decline, but not the impact
5. 6 use cases for blockchain in security

Editor's Picks

1. What’s new in Windows 10 security features: The privacy edition
2. 11 ways to hack 2FA
3. 7 highest-paying IT security jobs, 2018
4. A quick tour of the Dark Web
5. What an Apple phishing attack looks like
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.