CSO

CSO Daily

July 03, 2019

Image: Safely deploying TLS certificates: 5 common mistakes to avoid

Safely deploying TLS certificates: 5 common mistakes to avoid

A properly configured TLS cert is the first layer of defense for data in transit. Here are some tips to ensure a secure deployment. Read more ▶

Your Must-Read Stories

•

How to tell which Microsoft Office patching process to use

•

Review: CrowdStrike Falcon breaks the EDR mold

•

Top 8 security mistakes in SAP environments

•

How and why deepfake videos work — and what is at risk

•

Your backup and restore process is broken--here's how to fix it

•

AWS re:Inforce 2019: Amazon shows its dedication to cloud security

White Paper: Flexera

The Essential SaaS Management Toolkit

SaaS usage continues to increase. Gartner forecasts that by 2021, SaaS applications will account for 45% of software spend. Read more ▶

Image: How to tell which Microsoft Office patching process to use

How to tell which Microsoft Office patching process to use

How you download and deploy Microsoft Office patches depends on the version and license type you have. Here's how to determine which process to use. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Review: CrowdStrike Falcon breaks the EDR mold

Review: CrowdStrike Falcon breaks the EDR mold

The biggest differentiator with Falcon is that the brains of the platform exist completely in the cloud, which gives it unlimited scalability as well as a massive footprint of users and enterprises. Read more ▶

 
 
Image: Top 8 security mistakes in SAP environments

Top 8 security mistakes in SAP environments

The complexity of modern SAP footprints and common security failures have left many organizations exposed to avoidable risks. Read more ▶

Image: How and why deepfake videos work — and what is at risk

How and why deepfake videos work — and what is at risk

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous. Read more ▶

Image: Your backup and restore process is broken--here's how to fix it

Your backup and restore process is broken--here's how to fix it

Don't wait for a ransomware attack to expose backup flaws. These eight steps will put you on the path for reliable data restores. Read more ▶

Image: AWS re:Inforce 2019: Amazon shows its dedication to cloud security

AWS re:Inforce 2019: Amazon shows its dedication to cloud security

AWS re:Inforce sets the bar for cloud security and the industry. Now Amazon needs to reinforce this leadership in an era of dynamic software development and hybrid cloud computing. Read more ▶

White Paper: Zerto

The State of IT Resilience

Download the report to learn the key tenets of IT resilience, the challenges, opportunities and the 5 stages of maturity. Benchmark your IT organization and map your steps forward to achieve resilience and accelerate IT and digital transformation. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.