CSO

CSO Daily

May 01, 2019

Image: How to enable the Windows Potentially Unwanted Application (PUA) feature

How to enable the Windows Potentially Unwanted Application (PUA) feature

Turning on the PUA setting helps avoid users falling prey to malicious drive-by downloads. Read more ▶

Your Must-Read Stories

•

Why local governments are a hot target for cyberattacks

•

Rising to the cloud security challenge

•

Does it matter who the CISO reports to?

•

Review: How Aqua secures containers from development to production

•

How a data-driven approach to security helps a small healthcare team embrace automation

•

How to evaluate SOC-as-a-service providers

White Paper: Quest Software

Unified Endpoint Management (UEM): Address 3 Common Challenges

There are facing three key management challenges as organizations move toward digital transformation: a proliferation of endpoints, growing security threats and vulnerabilities, and rising demands for compliance with government and industry regulations. Read more ▶

Image: Why local governments are a hot target for cyberattacks

Why local governments are a hot target for cyberattacks

Recent ransomware and other attacks underscore the value attackers see in the data stored in city and regional government systems. Here's why they are vulnerable and what they can do to reduce the threat. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Rising to the cloud security challenge

Rising to the cloud security challenge

For many businesses, the fresh security risks posed by the rapid adoption of cloud technologies are driving deep security changes. For others, the cloud isn't the reason for the security overhaul but the fundamental enabler of it. Download this FREE digital issue of CSO magazine to learn more. Read more ▶

 
 
Image: Does it matter who the CISO reports to?

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness. Read more ▶

Image: Review: How Aqua secures containers from development to production

Review: How Aqua secures containers from development to production

The Aqua Cloud Native Security Platform uses an inherent advantage of containers, the fact that they are always highly specialized for their jobs, to create a cybersecurity structure based on whitelisting. Read more ▶

Image: How a data-driven approach to security helps a small healthcare team embrace automation

How a data-driven approach to security helps a small healthcare team embrace automation

Not-for-profit Martin's Point Health Care created a data-driven security framework to automate how threats are evaluated. Read more ▶

Image: How to evaluate SOC-as-a-service providers

How to evaluate SOC-as-a-service providers

Not every organization that needs a security operations center can afford to equip and staff one. A number of providers provide SOC as a service. Here's what you need to know about them. Read more ▶

eBook: Quest Software

A Zombie's Survival Guide in a Changing Database World

Is the database administrator dead? Or alive and preparing for the future? Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.