CSO

CSO Daily

July 17, 2019

Image: Review: How Barac ETV analyzes encrypted data streams

Review: How Barac ETV analyzes encrypted data streams

Barac’s Encrypted Traffic Visibility Platform can halt encrypted attacks — without breaking the encryption. In our tests, the results seemed mostly instantaneous. Read more ▶

Your Must-Read Stories

•

4 tips for getting the most from threat intelligence

•

From phish to network compromise in two hours: How Carbanak operates

•

5 ways compliance hurts security

•

Establishing your business’s risk tolerance

•

How do you secure the cloud? New data points a way

•

28 DevSecOps tools for baking security into the development process

White Paper: Open Text

Automotive parts manufacturer transforms data archiving with OpenText

Delphi drives efficiencies and savings with OpenText Data Archiving for SAP Solutions Read more ▶

Image: 4 tips for getting the most from threat intelligence

4 tips for getting the most from threat intelligence

It’s easy to gather data on potential threats, but you have to know what to do with that intelligence if you want to improve your security stance. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: From phish to network compromise in two hours: How Carbanak operates

From phish to network compromise in two hours: How Carbanak operates

Cybercriminal group Carbanak has stolen hundreds of millions of dollars from financial institutions. Here's a detailed analysis by Bitdefender of an attack on one bank. Read more ▶

 
 
Image: 5 ways compliance hurts security

5 ways compliance hurts security

The tasks of meeting regulatory requirements and providing true security that actually mitigates risk do not align. Here's how focusing exclusively on compliance can undermine security. Read more ▶

Image: Establishing your business’s risk tolerance

Establishing your business’s risk tolerance

Knowing your business risk appetite allows you to align security efforts to the business needs, prioritizing resources and spending on those areas where organizational leaders have the least appetite for risk. Here's how to do it. Read more ▶

Image: How do you secure the cloud? New data points a way

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private and hybrid cloud deployments. Here’s advice on the tools, information and organizational structure needed to execute a successful cloud security strategy. Read more ▶

Image: 28 DevSecOps tools for baking security into the development process

28 DevSecOps tools for baking security into the development process

Catch and remediate application vulnerabilities earlier and help integrate security in the the development process with these five categories of DevSecOps tools. Read more ▶

White Paper: Open Text

Business Center for SAP Solutions

Maximize automation of document-centric SAP® processes Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.