CSO

CSO Daily

July 16, 2019

Image: How to close SIEM visibility gaps created by legacy apps

How to close SIEM visibility gaps created by legacy apps

It's often difficult to make log files and other data from legacy applications accessible to security information and event management systems. Here are some options for improving visibility. Read more ▶

Your Must-Read Stories

•

The dirty dozen: 12 top cloud security threats

•

What is PKI? And how it secures just about everything online

•

How to disable basic authentication in Microsoft Office 365

•

Free Course: Learn to install and configure Splunk

•

A new website explains data breach risk

•

Back to basics: What is a computer virus?

eBook: ServiceNow Inc

Service Health With AIOps From ServiceNow

Learn how ServiceNow Event Management uses AIOps to dramatically improve business service availability and performance by mapping business services with accurate service context, intelligently analyzing events, integrating existing monitoring and event management tools, and reducing event volumes. Read more ▶

Image: The dirty dozen: 12 top cloud security threats

The dirty dozen: 12 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: What is PKI? And how it secures just about everything online

What is PKI? And how it secures just about everything online

Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption. It is baked into every web browser in use today to secure traffic across the public internet, but organizations can also deploy it to secure their internal communications. Read more ▶

 
 
Image: How to disable basic authentication in Microsoft Office 365

How to disable basic authentication in Microsoft Office 365

If you've implemented multi-factor authentication, you should disable the default basic authentication to make sure attackers can't exploit it. Read more ▶

Image: Free Course: Learn to install and configure Splunk

Free Course: Learn to install and configure Splunk

In partnership with tech training provider Pluralsight, CSO is offering free, limited-time access to the course “Installing and Configuring Splunk.” Read more ▶

Image: A new website explains data breach risk

A new website explains data breach risk

Breach Clarity ranks the risk of stolen or exposed personal data. It's a much needed work in progress. Read more ▶

Image: Back to basics: What is a computer virus?

Back to basics: What is a computer virus?

A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself. Read more ▶

eBook: ServiceNow Inc

Eliminate Business Service Outages By Moving to Service-aware IT Operations

A single outage can be the thread that causes business services to unravel. Can you quickly identify the root cause of an outage and its impact on your business? Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.