CSO

CSO Update

May 23, 2019

Image: How to conduct a proper GDPR audit: 4 key steps

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take. Read more ▶

Your Must-Read Stories

•

Over 90% of data transactions on IoT devices are unencrypted

•

How to defend against scams: 14 red flags everyone needs to be aware of

•

Review: How Awake Security uncovers malicious intent

•

Why reported breaches are the tip of the iceberg

•

Implementing and using the MITRE ATT&CK framework

•

How to isolate a Windows 7 machine from your network

Video/Webcast: Connection & HPE

Power High Performance Computing at Notre Dame

Supporting the research endeavors of thousands of scientists at The University of Notre Dame requires powerful compute power. Hear from the Associate Director of the Notre Dame Center for Research Computing as he highlights how HPE delivered the performance and capacity. Read more ▶

Image: Over 90% of data transactions on IoT devices are unencrypted

Over 90% of data transactions on IoT devices are unencrypted

A report from Zscaler reveals some troubling facts about the risks posed by network-connected IoT devices. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: How to defend against scams: 14 red flags everyone needs to be aware of

How to defend against scams: 14 red flags everyone needs to be aware of

Does your security awareness training program help your employees learn when someone is trying to scam them? Read more ▶

 
 
Image: Review: How Awake Security uncovers malicious intent

Review: How Awake Security uncovers malicious intent

This advanced network traffic monitoring platform identifies hidden threats and those that don’t use traditional malware, making it extremely powerful and useful in today’s threat environment. Read more ▶

Image: Why reported breaches are the tip of the iceberg

Why reported breaches are the tip of the iceberg

Thousands of businesses are breached every day without them even knowing it, compromising payment card data. The EMV chip isn’t the solution, but data devaluation can reduce the impact. Read more ▶

Image: Implementing and using the MITRE ATT&CK framework

Implementing and using the MITRE ATT&CK framework

The MITRE ATT&CK framework is a popular template for building detection and response programs. Here's what you'll find in its knowledgebase and how you can apply it to your environment. Read more ▶

Image: How to isolate a Windows 7 machine from your network

How to isolate a Windows 7 machine from your network

If you have a business reason to keep a Windows 7 system active past its 2020 end-of-life date, here's how to keep it from being a security liability on your network. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.