CSO

CSO Update

July 07, 2019

Image: 4 tips for building a strong security culture

4 tips for building a strong security culture

Instead of blame and fear, security teams need to create a culture of personal responsibility to best protect data. Here's how two security leaders do it. Read more ▶

Your Must-Read Stories

•

The new CISO's playbook: 5 rules to follow

•

Review: CrowdStrike Falcon breaks the EDR mold

•

Top 8 security mistakes in SAP environments

•

6 ways malware can bypass endpoint protection

•

4 security concerns for low-code and no-code development

•

Your backup and restore process is broken--here's how to fix it

Miscellaneous: Flexera

Webinar: Managing change in Java SE. So where are we?

Managing Change in Java SE: So Where Are We? WBNR Read more ▶

Image: The new CISO's playbook: 5 rules to follow

The new CISO's playbook: 5 rules to follow

Today’s privacy and regulatory requirements, breadth of threats and bad employee behavior require chief information security officers to add some new moves to the old playbook. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Review: CrowdStrike Falcon breaks the EDR mold

Review: CrowdStrike Falcon breaks the EDR mold

The biggest differentiator with Falcon is that the brains of the platform exist completely in the cloud, which gives it unlimited scalability as well as a massive footprint of users and enterprises. Read more ▶

 
 
Image: Top 8 security mistakes in SAP environments

Top 8 security mistakes in SAP environments

The complexity of modern SAP footprints and common security failures have left many organizations exposed to avoidable risks. Read more ▶

Image: 6 ways malware can bypass endpoint protection

6 ways malware can bypass endpoint protection

Breaches from attacks that defeat or run around endpoint protection measures are on the rise. Here's how attackers do it. Read more ▶

Image: 4 security concerns for low-code and no-code development

4 security concerns for low-code and no-code development

Low code does not mean low risk. By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide problems from security. Read more ▶

Image: Your backup and restore process is broken--here's how to fix it

Your backup and restore process is broken--here's how to fix it

Don't wait for a ransomware attack to expose backup flaws. These eight steps will put you on the path for reliable data restores. Read more ▶

eBook: Flexera Software

New eBook: A Six-Step Framework for Your Multi-Cloud Strategy

6 Step Framework for Multi-Cloud Strategy Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.