CSO

CSO Update

July 14, 2019

Image: What blockchain can and can't do for security

What blockchain can and can't do for security

Blockchain expert Rosa Shores agrees: Unless you have a data integrity problem, blockchain won't fix it. Try a distributed ledger instead. Read more ▶

Your Must-Read Stories

•

How a decentralized cloud model may increase security, privacy

•

Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable

•

Evaluating DNS providers: 4 key considerations

•

How CISOs become business leaders

•

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

•

Trust isn't new, so why are we acting like it is?

White Paper: Anexinet Corp., a Hewlett Packard Enterprise Platinum Partner

Predictive Insights with HPE InfoSight

Businesses must take a predictive analytics approach to transformation by mining relevant data to stay ahead of client, employee, and corporate needs. Read more ▶

Image: How a decentralized cloud model may increase security, privacy

How a decentralized cloud model may increase security, privacy

A new cloud model can support scalable applications while retaining safeguards of a decentralized, trust-minimized ecosystem. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable

Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable

HaXM is the next logical evolution of automated pentesting programs. Not only does it offer continuous scanning that is easy to configure, it also provides advice to help fix problems. Read more ▶

 
 
Image: Evaluating DNS providers: 4 key considerations

Evaluating DNS providers: 4 key considerations

DNS attacks are increasing, Is your Domain Name System implementation up to snuff? Here's what you need to know to make sure you have the provider right for you. Read more ▶

Image: How CISOs become business leaders

How CISOs become business leaders

Security leaders need to master marketing, HR, business lingo and more to really help lead their organizations, says William Hill’s group CISO. Read more ▶

Image: What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

Information Sharing and Analysis Organizations were created to make cyber threat data and best practices more accessible than with Information Sharing and Analysis Centers, but results are mixed. Read more ▶

Image: Trust isn't new, so why are we acting like it is?

Trust isn't new, so why are we acting like it is?

The industry is missing the mark when it comes to understanding – and protecting – this high value asset. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.