CSO

CSO Daily

July 09, 2019

Image: Must-have features in a modern network security architecture

Must-have features in a modern network security architecture

Form factors and use cases are changing, so network security must be more comprehensive, intelligent, and responsive than ever before. Read more ▶

Your Must-Read Stories

•

Remembering Mike Assante, a leader in critical infrastructure security

•

Evaluating DNS providers: 4 key considerations

•

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

•

Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable

•

The dirty dozen: 12 top cloud security threats

•

Dark web takedowns make good headlines, do little for security

Video/Webcast: Hitachi Vantara

The Business Proposition for Converged Infrastructure

Converged infrastructure: It’s one of the hottest topics in the IT industry. Join us as we present 2 sides of the coin: a market overview with Ashish Nadkarni, Group Vice President, Infrastructure Systems, Platforms and Technologies at IDC, followed by specific converged infrastructure solutions from Hitachi Vantara and Cisco. Read more ▶

Image: Remembering Mike Assante, a leader in critical infrastructure security

Remembering Mike Assante, a leader in critical infrastructure security

Thanks to Mike Assante, critical infrastructure stakeholders have a better understanding of and ability to respond to cybersecurity risks. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Evaluating DNS providers: 4 key considerations

Evaluating DNS providers: 4 key considerations

DNS attacks are increasing, Is your Domain Name System implementation up to snuff? Here's what you need to know to make sure you have the provider right for you. Read more ▶

 
 
Image: What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

Information Sharing and Analysis Organizations were created to make cyber threat data and best practices more accessible than with Information Sharing and Analysis Centers, but results are mixed. Read more ▶

Image: Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable

Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable

HaXM is the next logical evolution of automated pentesting programs. Not only does it offer continuous scanning that is easy to configure, it also provides advice to help fix problems. Read more ▶

Image: The dirty dozen: 12 top cloud security threats

The dirty dozen: 12 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services. Read more ▶

Image: Dark web takedowns make good headlines, do little for security

Dark web takedowns make good headlines, do little for security

Shutting down dark web marketplaces looks and feels good, but it hasn't significantly reduced risk. Worse, it drives cybercriminals to harder-to-track channels. Read more ▶

White Paper: Hitachi Vantara

Cisco and Hitachi Adaptive Solutions for Converged Infrastructure

Accelerating the Journey to a Data-centric Culture. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.