CSO

CSO Update

January 30, 2020

Image: The 9 Windows Server security settings you need to get right

The 9 Windows Server security settings you need to get right

With all the improvements Microsoft has made in Windows and Windows Server, it's time to evaluate whether your security settings are as effective as they could be. Read more ▶

Your Must-Read Stories

How to set up Windows Firewall to limit network access

Closing the security gap in OT/IT convergence

Review: LogicHub expertly automates security

Insecure configurations expose GE Healthcare devices to attacks

Implementation flaws make LoRaWAN networks vulnerable to attack

With email security, some things can't be outsourced

Video/Webcast: RSA Security Inc

Managing Digital Risk: A Worldwide Perspective on the Human Element

It's clear that digital initiatives are forcing both evolutionary and revolutionary changes in managing risk and security around the world. Read more ▶

Image: How to set up Windows Firewall to limit network access

How to set up Windows Firewall to limit network access

By enabling Windows Firewall with the proper settings, you can help shut out attackers and limit lateral movement if a breach occurs. Read more ▶

Image: Set your brand up for success with a .tech domain extension

DEALPOST

Set your brand up for success with a .tech domain extension

Read more ▶

Image: Closing the security gap in OT/IT convergence

Closing the security gap in OT/IT convergence

End-to-end security between converging information technology and operational technology worlds is imperative, but technical and cultural differences separate them. Here's how to close the gap. Read more ▶

 
 
Image: Review: LogicHub expertly automates security

Review: LogicHub expertly automates security

It's not only highly effective at diagnosing and countering threats, but it does so in a completely transparent way that is fully configurable and editable by users. Read more ▶

Image: Insecure configurations expose GE Healthcare devices to attacks

Insecure configurations expose GE Healthcare devices to attacks

The six high-risk vulnerabilities result from hard-coded or no credentials in remote access software and the use of outdated applications. Read more ▶

Image: Implementation flaws make LoRaWAN networks vulnerable to attack

Implementation flaws make LoRaWAN networks vulnerable to attack

New report from IOActive details implementation errors that expose LoRaWAN networks to attack and provides a framework for mitigating the risk. Read more ▶

Image: With email security, some things can't be outsourced

With email security, some things can't be outsourced

You can outsource your email, but a good chunk of securing that email remains in-house. Here's what you need to know. Read more ▶

Video/Webcast: OpenText

OpenText Core Share and OpenText Core Signature

The unified enterprise content collaboration and electronic signature solution! Controlled and Secure collaboration in the cloud by enabling collaboration through to e-signature right from your system of record without ever losing visibility and control of your content. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com