CSO

CSO Update

December 11, 2018

Image: 8 old technologies that still play roles in security

8 old technologies that still play roles in security

Newer isn't always better, at least where cybersecurity is concerned. For some applications, these older technologies are still effective ways to protect data and systems. Read more ▶

Your Must Read Stories

8 old technologies that still play roles in security

A look back at cybercrime in 2018

Using a password manager: 7 pros and cons

12 top web application firewalls compared

How to use Windows Update Delivery Optimization to distribute updates across your network

How do you secure the cloud? New data points a way

Best antivirus software: 14 top tools

Miscellaneous: Rubrik & Google Cloud

How High 5 Games Simplified Cloud Data Management with Rubrik and Google Cloud Platform

Dealing with the complexities of integrating your backup and recovery solution with the cloud? Learn how High 5 Games simplified data protection using Rubrik's policy-based data management solution and the Google Cloud Platform. Read more ▶

Image: A look back at cybercrime in 2018

A look back at cybercrime in 2018

Prepare now to mitigate the most cyber risk in 2019! Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: Using a password manager: 7 pros and cons

Using a password manager: 7 pros and cons

This veteran security pro feels more secure now that he's using a password manager, but there are still risks. Read more ▶

 
 
Image: 12 top web application firewalls compared

12 top web application firewalls compared

A web application firewall (WAF) is a critical component of an enterprise security infrastructure, providing a key security layer for web-facing applications and APIs. Read more ▶

Image: How to use Windows Update Delivery Optimization to distribute updates across your network

How to use Windows Update Delivery Optimization to distribute updates across your network

These are the Delivery Optimization settings you need to know to deliver feature and security updates without using Windows Software Update Services. Read more ▶

Image: How do you secure the cloud? New data points a way

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private, and hybrid cloud deployments. Here's advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy. Read more ▶

Image: Best antivirus software: 14 top tools

Best antivirus software: 14 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability. Read more ▶

White Paper: Palo Alto Networks

10 Things Your Next Firewall Must Do

This paper discusses ten points to consider and actively test in your current security i nfrastructure and your future NGFW. Read more ▶

You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.