CSO

CSO Daily

July 12, 2019

Image: How a decentralized cloud model may increase security, privacy

How a decentralized cloud model may increase security, privacy

A new cloud model can support scalable applications while retaining safeguards of a decentralized, trust-minimized ecosystem. Read more ▶

Your Must-Read Stories

•

Safely deploying TLS certificates: 5 common mistakes to avoid

•

Dark web takedowns make good headlines, do little for security

•

Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable

•

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

•

Evaluating DNS providers: 4 key considerations

•

5 ways compliance hurts security

Virtual Event: Citrix

Citrix Future of Work – Virtual Edition

We’re bringing the best of Citrix Synergy to you virtually! Hear from experts and thought leaders about top use cases, and how Citrix enables IT to confidently support new ways of working…You don’t want to miss out so register today! Read more ▶

Image: Safely deploying TLS certificates: 5 common mistakes to avoid

Safely deploying TLS certificates: 5 common mistakes to avoid

A properly configured TLS cert is the first layer of defense for data in transit. Here are some tips to ensure a secure deployment. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Dark web takedowns make good headlines, do little for security

Dark web takedowns make good headlines, do little for security

Shutting down dark web marketplaces looks and feels good, but it hasn't significantly reduced risk. Worse, it drives cybercriminals to harder-to-track channels. Read more ▶

 
 
Image: Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable

Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable

HaXM is the next logical evolution of automated pentesting programs. Not only does it offer continuous scanning that is easy to configure, it also provides advice to help fix problems. Read more ▶

Image: What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

Information Sharing and Analysis Organizations were created to make cyber threat data and best practices more accessible than with Information Sharing and Analysis Centers, but results are mixed. Read more ▶

Image: Evaluating DNS providers: 4 key considerations

Evaluating DNS providers: 4 key considerations

DNS attacks are increasing, Is your Domain Name System implementation up to snuff? Here's what you need to know to make sure you have the provider right for you. Read more ▶

Image: 5 ways compliance hurts security

5 ways compliance hurts security

The tasks of meeting regulatory requirements and providing true security that actually mitigates risk do not align. Here's how focusing exclusively on compliance can undermine security. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.