CSO

CSO Update

June 20, 2019

Image: 8 steps to make sure Microsoft Windows 10 1903 is ready for deployment

8 steps to make sure Microsoft Windows 10 1903 is ready for deployment

Follow these steps to identify problems that might crop up when you update to the Windows 10 1903 release. Read more ▶

Your Must-Read Stories

•

A new website explains data breach risk

•

6 questions to ask before buying an ICS / OT security monitoring tool

•

New MongoDB field-level encryption can help prevent data breaches

•

Forthright handling of cybercrime essential to improved results

•

Cybersecurity pros' haphazard participation in data privacy raises concern

•

What is a Trojan horse? How this tricky malware works

Miscellaneous: Talend & Stitch

Data to insight in minutes

Modernize your data warehouse and enable advanced sales and marketing analytics on AWS with Stitch Data Loader from Talend. Read more ▶

Image: A new website explains data breach risk

A new website explains data breach risk

Breach Clarity ranks the risk of stolen or exposed personal data. It's a much needed work in progress. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: 6 questions to ask before buying an ICS / OT security monitoring tool

6 questions to ask before buying an ICS / OT security monitoring tool

Shopping for an ICS / OT monitoring solution? Here's what you need to know about evaluating the vendors. Read more ▶

 
 
Image: New MongoDB field-level encryption can help prevent data breaches

New MongoDB field-level encryption can help prevent data breaches

MongoDB aims to prevent exposed data stores by encrypting data in a way that makes it useless if compromised. Read more ▶

Image: Forthright handling of cybercrime essential to improved results

Forthright handling of cybercrime essential to improved results

While it is has become generally well-known that enterprises have a problem dealing with cybercrime, the true extent of the problem is much worse than many realize. In fact, even the entities that really ought to know the reality – such as legal and regulatory authorities – are generally in the dark about how many incidents are occurring and how severe they are. Read more ▶

Image: Cybersecurity pros' haphazard participation in data privacy raises concern

Cybersecurity pros' haphazard participation in data privacy raises concern

Limited training and unclear roles/responsibilities for cybersecurity teams restrict the effectiveness of data privacy programs. Read more ▶

Image: What is a Trojan horse? How this tricky malware works

What is a Trojan horse? How this tricky malware works

A Trojan horse is a type of malware that can wreak havoc on computer networks — but only with your unwitting help. Read more ▶

White Paper: Beanworks

Mature Accounts Payable for the Small and Mid-Size Enterprise

Automation is one of today’s mega trends affecting workforces globally, and it's important for finance leaders to understand what automation can mean for their department and bottom line. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.