CSO

CSO Update

March 19, 2019

Image: 3 ways to monitor encrypted network traffic for malicious activity

3 ways to monitor encrypted network traffic for malicious activity

Ubiquitous encryption of network traffic prevents you from performing deep packet inspection, but you can still detect and prevent a lot of attacks. Read more ▶

Your Must-Read Stories

12 tips for effectively presenting cybersecurity to the board

Ransomware attack drives city to seek greater network visibility

Self-sovereign identity: 3 key questions

Congress steers clear of industrial control systems cybersecurity

7 hot cybersecurity trends (and 4 going cold)

Windows security updates that require new registry keys

Video/Webcast: Dell EMC and AMD

AMD EPYC-Based Dell EMC PowerEdge 14G Servers

Many of today's datacenter workloads require more than traditional processor architectures are providing. AMD's EPYC Enterprise CPUs together with Dell EMC PowerEdge servers provide the compute, memory bandwidth and IO that software defined, virtualized and High Performance computing applications crave. With unprecedented levels of compute, memory, IO, and security capabilities, learn how AMD EPYC based Dell EMC PowerEdge servers are redefining datacenters rules, improving performance and adding competitive value to your business. Read more ▶

Image: 12 tips for effectively presenting cybersecurity to the board

12 tips for effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more ▶

Image: HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

FROM OUR BUSINESS PARTNERS

HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

For the next few days, HP's online store is offering some steep discounts on laptops, desktops, printers and other products you might have had your eye on. Read more ▶

Image: Ransomware attack drives city to seek greater network visibility

Ransomware attack drives city to seek greater network visibility

After being hit with the Cryptolocker ransomware, the City of Westland realized it needed more insight into network traffic, not just at the perimeter. Read more ▶

 
 
Image: Self-sovereign identity: 3 key questions

Self-sovereign identity: 3 key questions

SSI is on the extreme end of the digital identity spectrum. Its focus is putting control back in the hands of you, the user. But SSI is not the only way to skin a cat. Read more ▶

Image: Congress steers clear of industrial control systems cybersecurity

Congress steers clear of industrial control systems cybersecurity

Industry resistance to regulation, complexity of securing ICS systems are roadblocks to passage of critical infrastructure cybersecurity legislation. Read more ▶

Image: 7 hot cybersecurity trends (and 4 going cold)

7 hot cybersecurity trends (and 4 going cold)

Is that security trend hot or not? From tools and technologies to threats, tactics, and training, the numbers don't lie. Read more ▶

Image: Windows security updates that require new registry keys

Windows security updates that require new registry keys

Don't assume automated Windows security updates are complete. You might need to add registry keys manually. Here are a few to check now. Read more ▶

Video/Webcast: Pure Storage

Pure Storage Data Hub and Veritas NetBackup: Engineered to Run and Protect a Wide Range of Modern Workloads

Pure Storage's FlashBlade enables your Data Hub, a consolidated platform to support the following AI/ML clusters, Test/Dev, Analytics, Containers. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.