Congress steers clear of industrial control systems cybersecurity My two favorite companies from RSA Conference 2019 CSO Update March 14, 2019 Congress steers clear of industrial control systems cybersecurity Industry resistance to regulation, complexity of securing ICS systems are roadblocks to passage of critical infrastructure cybersecurity legislation. Read more ▶ Your Must-Read Stories • My two favorite companies from RSA Conference 2019 • City of Raleigh implements ICS monitoring tool for water treatment plants • Windows security updates that require new registry keys • What is quantum cryptography? It's no silver bullet, but could improve security • Hackers use Slack to hide malware communications • 7 hot cybersecurity trends (and 4 going cold) Miscellaneous: Nasuni Nasuni for Windows Server 2008 File Server Migration Learn more about Nasuni software here. Read more ▶ My two favorite companies from RSA Conference 2019 The Media Trust offers website owners a way to detect malicious code coming from third parties, and DarkOwl scans the dark web for signs that a company has been compromised. Read more ▶ FROM OUR BUSINESS PARTNERS HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert For the next few days, HP's online store is offering some steep discounts on laptops, desktops, printers and other products you might have had your eye on. Read more ▶ City of Raleigh implements ICS monitoring tool for water treatment plants Securing operational technology systems is a different game than IT, but the City of Raleigh has deployed a CSO50 award-winning network monitoring solution that gives them greater visibility into its PLCs. Read more ▶ Windows security updates that require new registry keys Don't assume automated Windows security updates are complete. You might need to add registry keys manually. Here are a few to check now. Read more ▶ What is quantum cryptography? It's no silver bullet, but could improve security In the arms race between white and black hats, the infosec industry looks to quantum cryptography and quantum key distribution (QKD). That may be just part of the answer, however. Read more ▶ Hackers use Slack to hide malware communications A watering hole attack used Slack for its command-and-control communications to avoid network and endpoint detection. Read more ▶ 7 hot cybersecurity trends (and 4 going cold) Is that security trend hot or not? From tools and technologies to threats, tactics, and training, the numbers don't lie. Read more ▶ eGuide: Schneider Electric SA Edge Computing In the era of the Internet of Things, edge computing is fast becoming a necessity. Here's what you need to know as you consider bringing it into your organization. Read more ▶ Email not displaying correctly? View it in your browser You are currently subscribed to CSO Update as tuwanan.mono@blogger.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy Learn more about Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701 Please do not reply to this message. To contact someone directly, send an email to newsletters@idg.com.