CSO

CSO Update

May 05, 2019

Image: Public SAP exploits could enable attacks against thousands of companies

Public SAP exploits could enable attacks against thousands of companies

A recently released exploit takes advantage of a known configuration vulnerability that persists among many on-premise and cloud SAP instances. Here's what companies using SAP should do. Read more ▶

Your Must-Read Stories

FREE Download: Get the Spring 2019 digital issue of CSO magazine

How Akamai implemented a zero-trust model

Does it matter who the CISO reports to?

Why unauthenticated SMS is a security risk

Enabling the Windows Potentially Unwanted Application (PUA) feature

Review: How Aqua secures containers from development to production

White Paper: VeloCloud

SD-WAN Migration Strategies for Varying Network Architectures

This paper covers the migration design thought process,routing considerations, and a step-by-step migration path to insert your traditional WAN sites into an SD-WAN architecture. Read more ▶

Image: FREE Download: Get the Spring 2019 digital issue of CSO magazine

FREE Download: Get the Spring 2019 digital issue of CSO magazine

Learn how leading security organizations are rising to the cloud security challenge and finding new ways to protect data and assets. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: How Akamai implemented a zero-trust model

How Akamai implemented a zero-trust model

An effort that was triggered by a nation-state attack nine years ago has fundamentally transformed how people and devices access apps and services, limiting damage from lateral movement. Read more ▶

 
 
Image: Does it matter who the CISO reports to?

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness. Read more ▶

Image: Why unauthenticated SMS is a security risk

Why unauthenticated SMS is a security risk

Multifactor authentication that uses SMS messaging as a second factor is vulnerable to simple hacks. User education is the best defense. Read more ▶

Image: Enabling the Windows Potentially Unwanted Application (PUA) feature

Enabling the Windows Potentially Unwanted Application (PUA) feature

Turning on the PUA setting helps avoid users falling prey to malicious drive-by downloads. Read more ▶

Image: Review: How Aqua secures containers from development to production

Review: How Aqua secures containers from development to production

The Aqua Cloud Native Security Platform uses an inherent advantage of containers, the fact that they are always highly specialized for their jobs, to create a cybersecurity structure based on whitelisting. Read more ▶

White Paper: Riverbed Technology

Gartner Report: Broaden APM to Support Digital Business Transformation

Application Performance Monitoring (APM) capabilities have expanded considerably over the last three years, but the percentage of applications monitored in an enterprise has not. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.