6 steps for a solid patch management process

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Apr 11, 2018
Featured Image

No Congressional background check for IT contractor charged with fraud

Imran Awan was an IT contractor to members of Congress, with access to their email servers, yet not even a basic background check was conducted. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

6 steps for a solid patch management process
Get a 299-Piece All-Purpose First Aid Kit For $12 Today
Reputational risk and social media: When you're blocked or banned without notice
Ransomware incidents double, threatening companies of all sizes
Review: Intellicta brings issue tracking to compliance rules
7 insiders who breached security

Video/Webcast: Progress Kinvey

5 Architecture Considerations for Highly Innovative CIOs

As technology executives, we know we can't simply start over, we have to leverage existing systems while transitioning to a cloud-native architecture. Join serial entrepreneur, CTO and innovation expert Dmitri Tcherevik, as he discusses five architecture considerations necessary to overcome digital complexity while mitigating cost, compliance and other major concerns. Read More

Thumbnail Image

6 steps for a solid patch management process

Patch management is simply the practice of updating software – most often to address vulnerabilities. Although this sounds straightforward, patch management is not an easy process for most IT organizations. Here are the steps you need to take. Read More

Thumbnail Image
DealPost

Get a 299-Piece All-Purpose First Aid Kit For $12 Today

The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More

Thumbnail Image

Reputational risk and social media: When you're blocked or banned without notice

Businesses depend on sites like Facebook, Twitter, Dropbox, and Apple to interact with customers, promote their messages and store content. One complaint against you can shut you off from those services and damage your brand. Read More

Thumbnail Image

Ransomware incidents double, threatening companies of all sizes

Ransomware is the most common malware used when it comes to breaches, according to Verizon’s 2018 Data Breach Investigations Report. Read More

Thumbnail Image
INSIDER

Review: Intellicta brings issue tracking to compliance rules

The Intellicta Platform from TechDemocracy acts like a security information and event management (SIEM) console, but for compliancy issues. It pulls information from a series of network collectors and correlates that data into a continuously-monitored compliancy dashboard. Read More

Thumbnail Image

7 insiders who breached security

You can build a wall, set up perimeter defenses, and spend massive resources maintaining it all. But if your enemy is within, that wall will do you no good. Read More

White Paper: Druva

Building A Disaster Recovery Plan for The Cloud Era

Are you looking for best practices, tools and templates to help you plan a robust DR strategy? Business continuity is paramount, which means that IT teams must have a detailed plan in place to show how they can quickly resume mission-critical functions. Read More

CSO Insider

1. 14 top tools to assess, implement, and maintain GDPR compliance
2. What are the GDPR requirements?
3. Third-party security vetting: Do it before you sign a contract
4. Separation of duties and IT security
5. Review: Bricata adds threat hunting to traditional IPS/IDS

Editor's Picks

1. Rogues' gallery: 7 insiders who breached security
2. Why you don't need an RFID-blocking wallet
3. The 6 best password managers
4. 8 hot cyber security trends (and 4 going cold)
5. The 10 Windows group policy settings you need to get right
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.