CSO

CSO Update

February 12, 2019

Image: HP gives software robots their own IDs to audit their activities

HP gives software robots their own IDs to audit their activities

What are your robots up to? HP's new in-house Digital ID for software robots, a CSO50 award winner, makes it easier to keep track of robotic process automation (RPA). Read more ▶

Your Must-Read Stories

How polls are hacked: What every business should know

What is biometrics? And why collecting biometric data is risky

CrowdStrike Store opens its endpoint security agent to other vendors

How to harden Windows 10 workstations and servers: Disable SMB v1

RSAC Innovation Sandbox 2019: Cloud, identity, application security take center stage

Have we reached peak privacy? How good IAM and privacy can coexist

White Paper: One Identity

10 steps to cleaning up Active Directory -- and keeping them that way

In this document, you will discover 10 steps you can take to remediate user account problems in AD and to prevent them from occurring in the future. Read more ▶

Image: How polls are hacked: What every business should know

How polls are hacked: What every business should know

The recent revelation that Michael Cohen paid to rig a presidential primary poll underscores the risks they present to business. Here's how to identify and prevent poll rigging. Read more ▶

Image: Get TotalAV Essential AntiVirus for $19.99 (80% off)

FROM OUR BUSINESS PARTNERS

Get TotalAV Essential AntiVirus for $19.99 (80% off)

TotalAV works in harmony with all existing softwares already installed on your device, providing an unrivaled one-two punch of protection and performance maintenance for PC and Mac users alike. Read more ▶

Image: What is biometrics? And why collecting biometric data is risky

What is biometrics? And why collecting biometric data is risky

Biometric authentication uses physical or behavioral human characteristics to digitally identify a person to grant access to systems, devices or data. It has the potential to make authentication dramatically faster, easier and more secure than traditional passwords, but companies need to be careful about the biometric data they collect. Read more ▶

 
 
Image: CrowdStrike Store opens its endpoint security agent to other vendors

CrowdStrike Store opens its endpoint security agent to other vendors

CrowdStrike will share data its cloud-based endpoint security platform collects to give customers more options while minimizing compatibility and performance concerns. Read more ▶

Image: How to harden Windows 10 workstations and servers: Disable SMB v1

How to harden Windows 10 workstations and servers: Disable SMB v1

Early versions of Server Message Block are still present on many Windows networks and devices, leaving them open to attack. Here's how to detect and disable them. Read more ▶

Image: RSAC Innovation Sandbox 2019: Cloud, identity, application security take center stage

RSAC Innovation Sandbox 2019: Cloud, identity, application security take center stage

Take note of these startups. Innovation Sandbox has been around for 15 years. A whopping 42 percent of finalists from its first ten years have been acquired. Finalists in the past five years have received $1.5B in funding. Read more ▶

Image: Have we reached peak privacy? How good IAM and privacy can coexist

Have we reached peak privacy? How good IAM and privacy can coexist

Why privacy needs to remain at the forefront of identity and access management. Read more ▶

White Paper: One Identity

8 Best Practices for Identity and Access Management

Too often, IT is placed in the role of "gatekeeper" simply because only IT has the tools needed to manage identity. But with the right identity management tools in place, IT maintains the tools and infrastructure, and the business controls the actual identities. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.