CSO

CSO Daily

March 14, 2019

Image: Windows security updates that require new registry keys

Windows security updates that require new registry keys

Don't assume automated Windows security updates are complete. You might need to add registry keys manually. Here are a few to check now. Read more ▶

Your Must-Read Stories

•

Congress steers clear of industrial control systems cybersecurity

•

My two favorite companies from RSA Conference 2019

•

Review: Bitglass manages the mobility monster

•

7 hot cybersecurity trends (and 4 going cold)

•

Preserving the privacy of large data sets: Lessons learned from the Australian census

•

What are the new China Cybersecurity Law provisions? And how CISOs should respond

Miscellaneous: Nasuni

Nasuni for Windows Server 2008 File Server Migration

Learn more about Nasuni software here. Read more ▶

Image: Congress steers clear of industrial control systems cybersecurity

Congress steers clear of industrial control systems cybersecurity

Industry resistance to regulation, complexity of securing ICS systems are roadblocks to passage of critical infrastructure cybersecurity legislation. Read more ▶

Image: HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

FROM OUR BUSINESS PARTNERS

HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

For the next few days, HP's online store is offering some steep discounts on laptops, desktops, printers and other products you might have had your eye on. Read more ▶

Image: My two favorite companies from RSA Conference 2019

My two favorite companies from RSA Conference 2019

The Media Trust offers website owners a way to detect malicious code coming from third parties, and DarkOwl scans the dark web for signs that a company has been compromised. Read more ▶

 
 
Image: Review: Bitglass manages the mobility monster

Review: Bitglass manages the mobility monster

The Bitglass platform secures and controls official work-related interactions between a mobile device and company resources without infringing on a user's smartphone or personal applications. Read more ▶

Image: 7 hot cybersecurity trends (and 4 going cold)

7 hot cybersecurity trends (and 4 going cold)

Is that security trend hot or not? From tools and technologies to threats, tactics, and training, the numbers don't lie. Read more ▶

Image: Preserving the privacy of large data sets: Lessons learned from the Australian census

Preserving the privacy of large data sets: Lessons learned from the Australian census

Preserving the privacy of large data sets is hard, as the Australian Bureau of Statistics found out. These are the big takeaways for the upcoming U.S. census and others dealing with large amounts of personal data. Read more ▶

Image: What are the new China Cybersecurity Law provisions? And how CISOs should respond

What are the new China Cybersecurity Law provisions? And how CISOs should respond

New provisions to the China Cybersecurity Law allow the Chinese government access to enterprise networks operating in the country. Although the security risk that presents is unclear, CISOs can take steps to minimize the impact. Read more ▶

eGuide: Schneider Electric SA

Edge Computing

In the era of the Internet of Things, edge computing is fast becoming a necessity. Here’s what you need to know as you consider bringing it into your organization. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.