CSO

CSO Update

February 07, 2019

Image: Bank OZK's vulnerability risk index shows patching priorities everyone understands

Bank OZK's vulnerability risk index shows patching priorities everyone understands

Explaining vulnerability risk to non-technical executives can be hard. With his CSO50 award-winning Vulnerability Exception Risk Index, Bank OZK CISO Jason Cathey has devised a way to turn vulnerability data into a simple risk metric. Read more ▶

Your Must-Read Stories

•

Power LogOn offers 2FA and networked password management for the enterprise

•

How to harden Windows 10 workstations and servers: Disable SMB v1

•

Review: JASK ASOC isn't just another overloaded SIEM

•

The new CISO's playbook: 5 rules to follow

•

How ADP identifies and reduces third-party risk

•

2020 security predictions: What to look for and how to benefit

Miscellaneous: Bsquare

IoT: Enhancing Operations Through Intelligent Maintenance

This webinar will highlight how intelligent maintenance strategies help organizations realize broader operational benefits. Read more ▶

Image: Power LogOn offers 2FA and networked password management for the enterprise

Power LogOn offers 2FA and networked password management for the enterprise

This authentication tool is simple to set up and use, but the biggest selling point might be workable password management across the enterprise. Read more ▶

Image: You can sign up for this team collaboration app for free today

FROM OUR BUSINESS PARTNERS

You can sign up for this team collaboration app for free today

Unlock your team’s full potential with free chat, file sharing, and task management. Read more ▶

Image: How to harden Windows 10 workstations and servers: Disable SMB v1

How to harden Windows 10 workstations and servers: Disable SMB v1

Early versions of Server Message Block are still present on many Windows networks and devices, leaving them open to attack. Here's how to detect and disable them. Read more ▶

 
 
Image: Review: JASK ASOC isn't just another overloaded SIEM

Review: JASK ASOC isn't just another overloaded SIEM

The JASK Autonomous Security Operations Center coordinates various alerts and events into a picture of an ongoing threat or attack — the kinds of techniques that human threat hunters employ, only much faster. Read more ▶

Image: The new CISO's playbook: 5 rules to follow

The new CISO's playbook: 5 rules to follow

Today’s privacy and regulatory requirements, breadth of threats and bad employee behavior require chief information security officers to add some new moves to the old playbook. Read more ▶

Image: How ADP identifies and reduces third-party risk

How ADP identifies and reduces third-party risk

CSO50 award winner ADP's third-party assurance program helps it manage and mitigate risks posed by suppliers and contractors. Read more ▶

Image: 2020 security predictions: What to look for and how to benefit

2020 security predictions: What to look for and how to benefit

The coming flood of turn-of-the-decade forecasting offers a great opportunity to reorganize business plans, security plans and even career plans – if you are watching for the right things. Read more ▶

Video/Webcast: Dell EMC and Intel®

Advances in Data Protection for a Digital World

To out-innovate and out-pace their competition, organizations must be on a consistent path to keep their infrastructure modern. IT is under constant pressure to deliver optimized infrastructure for new business initiatives and supporting applications all while trying to contain or even reduce costs. Download this webcast from Dell EMC and Intel® to learn more. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.