CSO

CSO Daily

December 05, 2018

Image: How to use Windows Update Delivery Optimization to distribute updates across your network

How to use Windows Update Delivery Optimization to distribute updates across your network

These are the Delivery Optimization settings you need to know to deliver feature and security updates without using Windows Software Update Services. Read more ▶

Your Must Read Stories

•

How to use Windows Update Delivery Optimization to distribute updates across your network

•

Microsoft, Mastercard propose universal digital identity program

•

What is SSL, TLS? And why it’s time to upgrade to TLS 1.3

•

6 ways companies fail at security fundamentals

•

Hacking smart buildings

•

10 topics every security training program should cover

•

How identity layering improves data flow

eBook: Checkmarx

How to make your software security program successful

As new code deployments accelerate through wider adoption of DevOps methodology, maintaining software security is crucial to you and your customers. Is your software security program up to the challenge? If you’re not getting the most out of your software security program, our security experts may be able to diagnose your difficulties. Read more ▶

Image: Microsoft, Mastercard propose universal digital identity program

Microsoft, Mastercard propose universal digital identity program

Microsoft and Mastercard say the “single, reusable digital identity” could solve identity verification issues and help with fraud prevention. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: What is SSL, TLS? And why it’s time to upgrade to TLS 1.3

What is SSL, TLS? And why it’s time to upgrade to TLS 1.3

The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next. Read more ▶

 
 
Image: 6 ways companies fail at security fundamentals

6 ways companies fail at security fundamentals

A new report suggests many organizations are failing in the basic cyber hygiene efforts and leaving themselves exposed to hackers. Read more ▶

Image: Hacking smart buildings

Hacking smart buildings

Smart buildings are giant IoT devices begging to get hacked. A new report offers concrete advice on how to mitigate the risk to building automation and control systems (BACS). Read more ▶

Image: 10 topics every security training program should cover

10 topics every security training program should cover

A thorough end-user education program is a necessary weapon in the battle to protect your perimeter. These 10 topics are the baseline of what to include in an awareness training program. Read more ▶

Image: How identity layering improves data flow

How identity layering improves data flow

The layered approach for security is dead. Long live layered digital identity and identity in depth. Read more ▶

White Paper: Dell EMC and Intel®

IT Transformation: Success Hinges on CIO/CFO Collaboration

Enterprises throughout the world have made IT Transformation a priority in recent years. Unfortunately, despite investing heavily in time and money, many of them still haven’t found the secret to gaining significant improvements in customer service and a clear competitive advantage from these efforts. Now, a new study helps explain why. Less-than-stellar IT Transformation results often center on problems that arise between two pivotal players — CIOs and CFOs — and their struggle to work together as a cohesive team. Read more ▶

You are currently subscribed to Editorial - CSO Daily as newsletter@newslettercollector.com.
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.