CSO

CSO Daily

April 04, 2019

Image: Security technologies that provide the most savings

Security technologies that provide the most savings

A new report from Accenture and the Ponemon Institute quantifies which cybersecurity technologies provide the most value to an organization. Read more ▶

Your Must-Read Stories

•

How to prepare for the Microsoft Windows 10 1903 security feature update

•

These two books explain how to fix our broken security industry

•

Chinese hacking groups to ramp up cyber attacks on some industries, experts say

•

Review: Fidelis Deception breathes life into fake assets

•

Security basics: How honeypots catch hackers in the act

•

11 questions to ask before buying AI-enabled security software

White Paper: Skelmir

Strategies for Successful Deployment of an Embedded Java Application

Embedded applications are, by definition, resource-challenged compared to desktop or even mobile designs, while the needs for security and performance are more important than ever. Java remains an excellent choice for application development because of its security features and portability across any number of different processors. Read more ▶

Image: How to prepare for the Microsoft Windows 10 1903 security feature update

How to prepare for the Microsoft Windows 10 1903 security feature update

Microsoft is changing the way it does Windows 10 feature updates, and that will affect how you schedule update deferrals. Here's what you need to know. Read more ▶

Image: Get a two-year subscription to Ivacy VPN for only $2.03/mo

FROM OUR BUSINESS PARTNERS

Get a two-year subscription to Ivacy VPN for only $2.03/mo

Ivacy VPN ensures that all your downloads and devices stay totally secure, so you can stay safe online without being inconvenienced. Read more ▶

Image: These two books explain how to fix our broken security industry

These two books explain how to fix our broken security industry

Organizations spend billions each year on security, but much of that spend is on the wrong things. These books will point you in the right direction. Read more ▶

 
 
Image: Chinese hacking groups to ramp up cyber attacks on some industries, experts say

Chinese hacking groups to ramp up cyber attacks on some industries, experts say

Companies in industries critical to China’s five-year plan face a higher risk of nation-state-sponsored cyber attacks. Read more ▶

Image: Review: Fidelis Deception breathes life into fake assets

Review: Fidelis Deception breathes life into fake assets

Today's skilled hackers know, or at least suspect, that deception is in place and won't blindly follow breadcrumbs to fake assets. To combat this, Fidelis Deception creates realistic, living deception assets. Read more ▶

Image: Security basics: How honeypots catch hackers in the act

Security basics: How honeypots catch hackers in the act

A honeypot is a system designed to lure hackers into revealing their origins and techniques, and they're used by security researchers and corporate IT alike. Read more ▶

Image: 11 questions to ask before buying AI-enabled security software

11 questions to ask before buying AI-enabled security software

Infosec is complicated enough. Add AI/ML into your security software mix, and you may be asking for trouble. Or, choose the right vendor, and you could wind up with the best toys on the block. Here's what you need to know to wind up in the second camp. Read more ▶

White Paper: Pure Storage

Deploy SAP HANA® at Your Own Pace and Within Your Budget

SAP HANA can provide the insights you need to stay ahead of your competitors. If you’re ready to learn more about how the FlashStack CI solution can bring the SAP HANA platform within reach, read the full report right here. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.