6 steps for a solid patch management process

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Apr 12, 2018
Featured Image
INSIDER

4 open-source Mitre ATT&CK test tools compared

Any of these tools from Endgame, Red Canary, Mitre, and Uber will get your red team and pentesters started with Mitre's ATT&CK framework. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

6 steps for a solid patch management process
Software-defined perimeter: Important initiative, ineffective name
Reputational risk and social media: When you're blocked or banned without notice
What hackers do: their motivations and their malware
Microsoft Windows 10 vs. Apple macOS: 18 security features compared
6 reasons you're failing to focus on your biggest IT security threats

Video/Webcast: AWS

Accelerate Decision Making with Real-Time Analytics on AWS

In this webinar, you'll learn about AWS real-time analytic solutions, including Amazon Kinesis Data Streams, Kinesis Data Firehose, and Kinesis Data Analytics. You'll also hear about real-time solutions from APN Partners, Databricks, MemSQL, and Zoomdata that complement or integrate with Amazon Kinesis services. When: Apr. 19, 2018 | 10 am PST/1 pm EST Read More

Thumbnail Image

6 steps for a solid patch management process

Patch management is simply the practice of updating software – most often to address vulnerabilities. Although this sounds straightforward, patch management is not an easy process for most IT organizations. Here are the steps you need to take. Read More

Thumbnail Image

Software-defined perimeter: Important initiative, ineffective name

A geeky and confusing name doesn't communicate business, privacy, and security benefits. Instead of software-defined perimeter, I suggest ubiquitous security access services (USAS). Read More

Thumbnail Image

Reputational risk and social media: When you're blocked or banned without notice

Businesses depend on sites like Facebook, Twitter, Dropbox, and Apple to interact with customers, promote their messages and store content. One complaint against you can shut you off from those services and damage your brand. Read More

Thumbnail Image

What hackers do: their motivations and their malware

Whether a hacker uses a computer exploit or malware, their motivations are the same. Understanding why and how hackers hack is key to your defense. Read More

Thumbnail Image
INSIDER

Microsoft Windows 10 vs. Apple macOS: 18 security features compared

Here's how the world's two most popular desktop OSes keep systems and data safe from malware, unauthorized access, hardware exploits and more. Read More

Thumbnail Image
INSIDER

6 reasons you're failing to focus on your biggest IT security threats

Most companies are not focused on the real security threats they face, leaving them ever more vulnerable. That can change if they trust their data rather than the hype. Read More

White Paper: One Identity

Gartner has named One Identity a Leader in its February 2018 MQ for Identity Governance and Administration

Each year, Gartner Inc. evaluates vendors in the Identity Governance and Administration market. We believe their research has particular significance because it often identifies the innovations that drive the market. As part of that report, Gartner also releases the Magic Quadrant, which shows the relative positions of the market's vendors. One Identity is honored to be recognized as a Leader in the Gartner Magic Quadrant for 2018. Read More

CSO Insider

1. 14 top tools to assess, implement, and maintain GDPR compliance
2. What are the GDPR requirements?
3. Third-party security vetting: Do it before you sign a contract
4. Separation of duties and IT security
5. Review: Bricata adds threat hunting to traditional IPS/IDS

Editor's Picks

1. Rogues' gallery: 7 insiders who breached security
2. Why you don't need an RFID-blocking wallet
3. The 6 best password managers
4. 8 hot cyber security trends (and 4 going cold)
5. The 10 Windows group policy settings you need to get right
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.