CSO

CSO Update

June 25, 2019

Image: Top 6 macOS Mojave endpoint protection products

Top 6 macOS Mojave endpoint protection products

Here's how the top six macOS Mojave antivirus tools rank for performance, protection and usability. Read more ▶

Your Must-Read Stories

•

Review: CrowdStrike Falcon breaks the EDR mold

•

How to build a strong security culture

•

4 security concerns for low-code and no-code development

•

Why GE consolidated its identity and access management infrastructure

•

How to evaluate SOC-as-a-service providers

•

A data-driven approach to security helps a small healthcare team embrace automation

Sponsor Article: Adobe Systems Inc.

Back Office Speed Drives Growth at Hitachi Solutions with Microsoft Dynamics 365 and Adobe Sign

Hitachi Solutions seized on the opportunity to integrate Microsoft Dynamics 365 with the e-signature capabilities of Adobe Sign, part of Adobe Document Cloud. The solution accelerates sales contract workflows as much as 80% and cuts document processing times in half. Read more ▶

Image: Review: CrowdStrike Falcon breaks the EDR mold

Review: CrowdStrike Falcon breaks the EDR mold

The biggest differentiator with Falcon is that the brains of the platform exist completely in the cloud, which gives it unlimited scalability as well as a massive footprint of users and enterprises. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: How to build a strong security culture

How to build a strong security culture

Instead of blame and fear, security teams need to create a culture of personal responsibility to best protect data. Here's how two security leaders do it. Read more ▶

 
 
Image: 4 security concerns for low-code and no-code development

4 security concerns for low-code and no-code development

Low code does not mean low risk. By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide problems from security. Read more ▶

Image: Why GE consolidated its identity and access management infrastructure

Why GE consolidated its identity and access management infrastructure

A multi-year effort to centralize GE's IAM functionality has resulted in significant cost savings, improved onboarding and better ability to meet regulatory requirements. Read more ▶

Image: How to evaluate SOC-as-a-service providers

How to evaluate SOC-as-a-service providers

Not every organization that needs a security operations center can afford to equip and staff one. A number of providers provide SOC as a service. Here's what you need to know about them. Read more ▶

Image: A data-driven approach to security helps a small healthcare team embrace automation

A data-driven approach to security helps a small healthcare team embrace automation

Not-for-profit Martin's Point Health Care created a data-driven security framework to automate how threats are evaluated. Read more ▶

Miscellaneous: IBM

Backup as a service for data protection

Enable information resiliency with cloud-based data protection solutions from IBM. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.