CSO

CSO Daily

December 11, 2018

Image: Review: How StackRox protects containers

Review: How StackRox protects containers

StackRox fully integrates with Kubernetes so that it touches all three phases of containerization deployment: the building of the containers, the deployment of them into the cloud infrastructure, and finally the running of those containers as they perform their intended functions. Read more ▶

Your Must Read Stories

•

Review: How StackRox protects containers

•

5 open source intrusion detection tools that are too good to ignore

•

What is an RDP attack? 7 tips for mitigating your exposure

•

AI in cybersecurity: what works and what doesn't

•

How to set up a successful digital forensics program

•

Top application security tools for 2019

•

What is security’s role in digital transformation?

Miscellaneous: Rubrik & Google Cloud

How High 5 Games Simplified Cloud Data Management with Rubrik and Google Cloud Platform

Dealing with the complexities of integrating your backup and recovery solution with the cloud? Learn how High 5 Games simplified data protection using Rubrik’s policy-based data management solution and the Google Cloud Platform. Read more ▶

Image: 5 open source intrusion detection tools that are too good to ignore

5 open source intrusion detection tools that are too good to ignore

Everyone should employ an intrusion detection system (IDS) to monitor their network and flag any suspicious activity or automatically shut down potentially malicious traffic. We look at five of the best open source options. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: What is an RDP attack? 7 tips for mitigating your exposure

What is an RDP attack? 7 tips for mitigating your exposure

Microsoft's Remote Desktop Protocol has become a popular attack vector. Here's what you need to know about the threat. Read more ▶

 
 
Image: AI in cybersecurity: what works and what doesn't

AI in cybersecurity: what works and what doesn't

Much of what we hear about artificial intelligence and machine learning in security products is steeped in marketing, making it hard to know what these tools actually do. Here's a clear-eyed look at the current state of AI & ML in security. Read more ▶

Image: How to set up a successful digital forensics program

How to set up a successful digital forensics program

The time to set up a digital forensics program is before you have a breach. Here are the decisions you need to make. Read more ▶

Image: Top application security tools for 2019

Top application security tools for 2019

Checking for security flaws in your applications is essential. These tools can help find and fix them. Read more ▶

Image: What is security’s role in digital transformation?

What is security’s role in digital transformation?

Digital transformation is front of mind for many senior executives, but too often security is left behind. Read more ▶

White Paper: Palo Alto Networks

10 Things Your Next Firewall Must Do

This paper discusses ten points to consider and actively test in your current security i nfrastructure and your future NGFW. Read more ▶

You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.