CSO

CSO Update

June 27, 2019

Image: Top 8 security mistakes in SAP environments

Top 8 security mistakes in SAP environments

The complexity of modern SAP footprints and common security failures have left many organizations exposed to avoidable risks. Read more ▶

Your Must-Read Stories

•

Your backup and restore process is broken--here's how to fix it

•

How to use the new Microsoft 365 Business Conditional Access feature

•

Telcos around the world hit by long-term intelligence gathering cyberattack

•

The new CISO's playbook: 5 rules to follow

•

Top cyber security certifications: Who they're for, what they cost, and which you need

•

8 cheap or free cybersecurity training resources

White Paper: Adobe Systems Inc.

Enterprise Collaboration: Benefits, Misalignments, and Risks

Enterprises collaboration and digital transformation initiatives, enabled by technology, bring tangible business benefits - but misalignments between business users and IT staff need to be resolved and risks to enterprise data need to be addresses. Read more ▶

Image: Your backup and restore process is broken--here's how to fix it

Your backup and restore process is broken--here's how to fix it

Don't wait for a ransomware attack to expose backup flaws. These eight steps will put you on the path for reliable data restores. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: How to use the new Microsoft 365 Business Conditional Access feature

How to use the new Microsoft 365 Business Conditional Access feature

Microsoft 365 Conditional Access lets you automate conditional access controls for cloud applications. If you haven't enabled it yet, you should. Read more ▶

 
 
Image: Telcos around the world hit by long-term intelligence gathering cyberattack

Telcos around the world hit by long-term intelligence gathering cyberattack

Operation Soft Cell saw telcos around the world lose over 100GB of call record data, but it could have been much worse. Attackers could have shut down cell networks if they wanted. Read more ▶

Image: The new CISO's playbook: 5 rules to follow

The new CISO's playbook: 5 rules to follow

Today’s privacy and regulatory requirements, breadth of threats and bad employee behavior require chief information security officers to add some new moves to the old playbook. Read more ▶

Image: Top cyber security certifications: Who they're for, what they cost, and which you need

Top cyber security certifications: Who they're for, what they cost, and which you need

Expand your skills, know-how and career horizons with these highly respected cyber security certifications. Read more ▶

Image: 8 cheap or free cybersecurity training resources

8 cheap or free cybersecurity training resources

Use these free and cheap resources to train employees in entry-level cybersecurity skills, and to help job seekers "hack through the HR firewall." Read more ▶

Miscellaneous: Adobe Systems Inc.

Forrester TEI Adobe Sign

Cost savings and business benefits enabled by Adobe Sign. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.