CSO

CSO Daily

July 11, 2019

Image: What blockchain can and can't do for security

What blockchain can and can't do for security

Blockchain expert Rosa Shores agrees: Unless you have a data integrity problem, blockchain won't fix it. Try a distributed ledger instead. Read more ▶

Your Must-Read Stories

•

How CISOs become business leaders

•

5 mistakes to avoid when deploying TLS certs

•

How to tell which Microsoft Office patching process to use

•

6 ways malware can bypass endpoint protection

•

Back to basics: Everything you need to know about adware

•

8 cheap or free cybersecurity training resources

eBook: ServiceNow Inc

Now on Now Story: Taking Charge of ServiceNow’s IT Project Portfolio

In this eBook, we explain the ServiceNow® IT Business Management (ITBM) journey–how we’ve transformed the way we manage our IT project portfolio to deliver predictable, high-value business outcomes. Read more ▶

Image: How CISOs become business leaders

How CISOs become business leaders

Security leaders need to master marketing, HR, business lingo and more to really help lead their organizations, says William Hill’s group CISO. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: 5 mistakes to avoid when deploying TLS certs

5 mistakes to avoid when deploying TLS certs

A properly configured TLS cert is the first layer of defense for data in transit. Here are some tips to ensure a secure deployment. Read more ▶

 
 
Image: How to tell which Microsoft Office patching process to use

How to tell which Microsoft Office patching process to use

How you download and deploy Microsoft Office patches depends on the version and license type you have. Here's how to determine which process to use. Read more ▶

Image: 6 ways malware can bypass endpoint protection

6 ways malware can bypass endpoint protection

Breaches from attacks that defeat or run around endpoint protection measures are on the rise. Here's how attackers do it. Read more ▶

Image: Back to basics: Everything you need to know about adware

Back to basics: Everything you need to know about adware

Adware is deceptive software that earns its creators money through fraudulent user clicks. Fortunately, it's one of the the most detectable types of malware. Read more ▶

Image: 8 cheap or free cybersecurity training resources

8 cheap or free cybersecurity training resources

Use these free and cheap resources to train employees in entry-level cybersecurity skills, and to help job seekers "hack through the HR firewall." Read more ▶

eBook: Base2 Solutions

Case Study Ebook: Stories of Digital Innovation

Digital Innovation (DI) can provide meaningful impacts for businesses of all types – companies looking for a competitive edge need to embrace DI. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.