CSO

CSO Daily

January 29, 2020

Image: With email security, some things can't be outsourced

With email security, some things can't be outsourced

You can outsource your email, but a good chunk of securing that email remains in-house. Here's what you need to know. Read more ▶

Your Must-Read Stories

•

The 9 Windows Server security settings you need to get right

•

Implementation flaws make LoRaWAN networks vulnerable to attack

•

Magecart-related arrests made in Indonesia

•

Closing the security gap in OT/IT convergence

•

5 ways to cope with the cybersecurity skills shortage (that don't involve hiring)

•

Data on the rise: 4 new challenges security must master

eBook: ServiceNow Inc

How ServiceNow Delivers High-Performance Business Services with AIOps

Learn how ServiceNow has been applying machine learning and analytics with AIOps to help you cut through event noise to create actionable signals, identify service outages and degradations, remediate service and infrastructure issues accurately, and drive continuous improvement in service quality. Read more ▶

Image: The 9 Windows Server security settings you need to get right

The 9 Windows Server security settings you need to get right

With all the improvements Microsoft has made in Windows and Windows Server, it’s time to evaluate whether your security settings are as effective as they could be. Read more ▶

Image: Set your brand up for success with a .tech domain extension

DEALPOST

Set your brand up for success with a .tech domain extension

Read more ▶

Image: Implementation flaws make LoRaWAN networks vulnerable to attack

Implementation flaws make LoRaWAN networks vulnerable to attack

New report from IOActive details implementation errors that expose LoRaWAN networks to attack and provides a framework for mitigating the risk. Read more ▶

 
 
Image: Magecart-related arrests made in Indonesia

Magecart-related arrests made in Indonesia

The three individuals arrested represent only a small portion of the Magecart web-skimming group, but the investigation is ongoing. Read more ▶

Image: Closing the security gap in OT/IT convergence

Closing the security gap in OT/IT convergence

End-to-end security between converging information technology and operational technology worlds is imperative, but technical and cultural differences separate them. Here’s how to close the gap. Read more ▶

Image: 5 ways to cope with the cybersecurity skills shortage (that don't involve hiring)

5 ways to cope with the cybersecurity skills shortage (that don't involve hiring)

Unable to hire their way out of cybersecurity staffing problems, CISOs are turning to process automation, advanced analytics, and third-party services, among other methods. Read more ▶

Image: Data on the rise: 4 new challenges security must master

Data on the rise: 4 new challenges security must master

Data is information security's bread and butter, but the rise of data brings both new challenges and new opportunities. To meet them, security needs to change its relationship with data. Read more ▶

eBook: ServiceNow Inc

Service Health With AIOps From ServiceNow

Learn how ServiceNow Event Management uses AIOps to dramatically improve business service availability and performance by mapping business services with accurate service context, intelligently analyzing events, integrating existing monitoring and event management tools, and reducing event volumes. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com