CSO

CSO Update

December 03, 2019

Image: How to evaluate a CASB

How to evaluate a CASB

All cloud access security brokers share core functionality, but they deliver it differently and they all have unique feature sets. Here's what you need to know before buying one. Read more ▶

Your Must-Read Stories

•

Flex streamlines app access for 20k suppliers with IAM overhaul

•

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

•

7 mobile security threats that may catch you by surprise

•

How to build a Windows disaster recovery toolkit

•

Review: How NeuVector protects containers throughout their lifecycle

•

What it takes to be an interim CISO

White Paper: Nexonia

The 5 Step Guide to Choosing an Expense Solution for Sage Intacct

In five steps, we’ll cover everything from mapping the needs of every user and department, to navigating solution vendors and product demonstrations. You’ll have the knowledge and tools to compare the myriad of solutions available with a clear path to selecting a T&E solution that connects seamlessly with Sage Intacct. Read more ▶

Image: Flex streamlines app access for 20k suppliers with IAM overhaul

Flex streamlines app access for 20k suppliers with IAM overhaul

Contract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: CrowdStrike, Ukraine, and the DNC server: Timeline and facts

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

Politicizing cybersecurity only serves to undermine trust in its practices and objectivity, experts fear. Read more ▶

 
 
Image: 7 mobile security threats that may catch you by surprise

7 mobile security threats that may catch you by surprise

Even if you're usually savvy about cybersecurity, anyone can have a vulnerable moment (in our writer's case, it was his mother's funeral). Read more ▶

Image: How to build a Windows disaster recovery toolkit

How to build a Windows disaster recovery toolkit

Sooner or later, a security incident will shut down or disrupt your network. You'll be better prepared with these items in your disaster recovery toolkit. Read more ▶

Image: Review: How NeuVector protects containers throughout their lifecycle

Review: How NeuVector protects containers throughout their lifecycle

Most traditional security products have very little visibility into containers running in the cloud. NeuVector protects containers from within the containerized environment. Read more ▶

Image: What it takes to be an interim CISO

What it takes to be an interim CISO

Being an interim or virtual CISO (vCISO) comes with many of the same demands of permanent security leadership roles, but also has its own unique challenges and rewards. Read more ▶

White Paper: PerimeterX

Five Major Bot Threats to Holiday E-commerce and How To Stop Them

The 2019 holiday shopping season is expected to have record losses due to malicious bot activity. Automated bot attacks make up more than 50% of traffic to retail sites, and are becoming increasingly sophisticated as they learn how to avoid detection. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.