CSO

CSO Update

May 16, 2019

Image: Does your cyber insurance cover social engineering? Read the fine print

Does your cyber insurance cover social engineering? Read the fine print

Some cyber insurance policies will pay only a small fraction of damages if an attacker used social engineering. Here's how to estimate the risk. Read more ▶

Your Must-Read Stories

Microsoft urges Windows customers to patch wormable RDP flaw

CSO50 2019: Seeding security in the cloud

The second Meltdown: New Intel CPU attacks leak secrets

5 tips for better backups with Azure Backup Agent

Cybersecurity professionals are no match for cyber-adversaries

The new CISO's playbook: 5 rules to follow

eBook: S-NET Communications

2019 SD-WAN Market Landscape

SD-WAN alleviates several of the technical, financial and operational constraints of its predecessor data networks. Benefits and opportunities abound with SD-WAN, but there are some critical differences compared to older technologies: how it is deployed and how it is managed. This Market Landscape report explores the primary deployment approaches and offers market insights to enterprises at all stages of SD-WAN adoption. Read more ▶

Image: Microsoft urges Windows customers to patch wormable RDP flaw

Microsoft urges Windows customers to patch wormable RDP flaw

A newly found vulnerability allows remote exploits using the Remote Desktop Protocol to gain full access to systems with no authentication. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: CSO50 2019: Seeding security in the cloud

CSO50 2019: Seeding security in the cloud

CSO50 award-winning companies are rising to the cloud security challenge and finding new ways to protect data and assets. Read more ▶

 
 
Image: The second Meltdown: New Intel CPU attacks leak secrets

The second Meltdown: New Intel CPU attacks leak secrets

Intel has done some mitigations for these vulnerabilities that can leak secrets from virtual machines, secure enclaves and kernel memory. Here's how the attacks work. Read more ▶

Image: 5 tips for better backups with Azure Backup Agent

5 tips for better backups with Azure Backup Agent

Both on-premises and cloud networks need backup solutions that allow you to recover from ransomware attacks quickly. One option is to use the Azure Backup Agent. Read more ▶

Image: Cybersecurity professionals are no match for cyber-adversaries

Cybersecurity professionals are no match for cyber-adversaries

In the battle against hackers, cyber-adversaries have an advantage over cyber-defenders, new research from ESG and ISSA finds. Read more ▶

Image: The new CISO's playbook: 5 rules to follow

The new CISO's playbook: 5 rules to follow

Today's privacy and regulatory requirements, breadth of threats and bad employee behavior require chief information security officers to add some new moves to the old playbook. Read more ▶

White Paper: Dell EMC and Intel®

Flash Storage Fuels IT Transformation

The Quantified Impacts of Organizational Flash Storage Use Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.