CSO

CSO Daily

June 26, 2019

Image: Top 8 security mistakes in SAP environments

Top 8 security mistakes in SAP environments

The complexity of modern SAP footprints and common security failures have left many organizations exposed to avoidable risks. Read more ▶

Your Must-Read Stories

•

How to use the new Microsoft 365 Business Conditional Access feature

•

Telcos around the world hit by long-term intelligence gathering cyberattack

•

Review: CrowdStrike Falcon breaks the EDR mold

•

4 security concerns for low-code and no-code development

•

Building a strong security culture

•

Top 6 macOS Mojave endpoint protection products

Miscellaneous: Quest Software

Protecting Data Stored On Premises and in Azure Using NetValut

Explore best practices for protecting the data in a hybrid data center using NetVault Backup and the Microsoft Azure cloud. Read more ▶

Image: How to use the new Microsoft 365 Business Conditional Access feature

How to use the new Microsoft 365 Business Conditional Access feature

Microsoft 365 Conditional Access lets you automate conditional access controls for cloud applications. If you haven't enabled it yet, you should. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Telcos around the world hit by long-term intelligence gathering cyberattack

Telcos around the world hit by long-term intelligence gathering cyberattack

Operation Soft Cell saw telcos around the world lose over 100GB of call record data, but it could have been much worse. Attackers could have shut down cell networks if they wanted. Read more ▶

 
 
Image: Review: CrowdStrike Falcon breaks the EDR mold

Review: CrowdStrike Falcon breaks the EDR mold

The biggest differentiator with Falcon is that the brains of the platform exist completely in the cloud, which gives it unlimited scalability as well as a massive footprint of users and enterprises. Read more ▶

Image: 4 security concerns for low-code and no-code development

4 security concerns for low-code and no-code development

Low code does not mean low risk. By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide problems from security. Read more ▶

Image: Building a strong security culture

Building a strong security culture

Instead of blame and fear, security teams need to create a culture of personal responsibility to best protect data. Here's how two security leaders do it. Read more ▶

Image: Top 6 macOS Mojave endpoint protection products

Top 6 macOS Mojave endpoint protection products

Here's how the top six macOS Mojave antivirus tools rank for performance, protection and usability. Read more ▶

Solution Center: Slalom Consulting

Unify Healthcare Data Onto a Single Platform to Reduce Time to Insights

Work with Slalom and Amazon Web Services to increase visibility and access to better data. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.