CSO

CSO Daily

April 30, 2019

Image: Review: How Aqua secures containers from development to production

Review: How Aqua secures containers from development to production

The Aqua Cloud Native Security Platform uses an inherent advantage of containers, the fact that they are always highly specialized for their jobs, to create a cybersecurity structure based on whitelisting. Read more ▶

Your Must-Read Stories

•

Does it matter who the CISO reports to?

•

How to evaluate SOC-as-a-service providers

•

GandCrab attackers exploit recently patched Confluence vulnerability

•

Researchers warn of unpatched vulnerability in Oracle WebLogic Server

•

How to meet the "reasonable security" requirement

•

Top 10 global cybersecurity hubs for 2019

Miscellaneous: W.B. Mason, an HP Platinum Partner

Advance Business Performance and Security With AMD Processors

Read this solution brief to learn how the HP EliteBook 700 Series G5 notebook with the AMD Ryzen™ PRO processor with Radeon™ Vega graphics can transform your workforce and keep your business competitive. Read more ▶

Image: Does it matter who the CISO reports to?

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: How to evaluate SOC-as-a-service providers

How to evaluate SOC-as-a-service providers

Not every organization that needs a security operations center can afford to equip and staff one. A number of providers provide SOC as a service. Here's what you need to know about them. Read more ▶

 
 
Image: GandCrab attackers exploit recently patched Confluence vulnerability

GandCrab attackers exploit recently patched Confluence vulnerability

If your company uses Confluence, make sure you have the latest available patches for this vulnerability. Read more ▶

Image: Researchers warn of unpatched vulnerability in Oracle WebLogic Server

Researchers warn of unpatched vulnerability in Oracle WebLogic Server

Detected scans suggest attacker are seeking vulnerable servers to target for attacks. Read more ▶

Image: How to meet the

How to meet the "reasonable security" requirement

Privacy regulations such as the GDPR and CCPA require companies to provide "reasonable security" to protect customers' personal information. Here's how you might best achieve that standard. Read more ▶

Image: Top 10 global cybersecurity hubs for 2019

Top 10 global cybersecurity hubs for 2019

Many cities and regions are vying for the title of Cybersecurity Capital. Here are 10 of the leading and emerging contenders. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.