CSO

CSO Daily

January 27, 2020

Image: Closing the security gap in OT/IT convergence

Closing the security gap in OT/IT convergence

End-to-end security between converging information technology and operational technology worlds is imperative, but technical and cultural differences separate them. Here’s how to close the gap. Read more ▶

Your Must-Read Stories

•

5 ways to cope with the cybersecurity skills shortage (that don't involve hiring)

•

Insecure configurations expose GE Healthcare devices to attacks

•

3 ways to make your Windows network harder to attack

•

What is cryptojacking? How to prevent, detect, and recover from it

•

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

•

7 security incidents that cost CISOs their jobs

eGuide: 15Five

15Five’s Handbook for Improving Employee Experience

Download 15Five’s Handbook for Improving Employee Experience to learn how to tailor your programs and practices so that every individual has an opportunity to thrive. Read more ▶

Image: 5 ways to cope with the cybersecurity skills shortage (that don't involve hiring)

5 ways to cope with the cybersecurity skills shortage (that don't involve hiring)

Unable to hire their way out of cybersecurity staffing problems, CISOs are turning to process automation, advanced analytics, and third-party services, among other methods. Read more ▶

Image: Get this essential cloud security certification training bundle for only $49

DEALPOST

Get this essential cloud security certification training bundle for only $49

These web-based courses are perfect for anyone who doesn’t have the time to attend traditional classes Read more ▶

Image: Insecure configurations expose GE Healthcare devices to attacks

Insecure configurations expose GE Healthcare devices to attacks

The six high-risk vulnerabilities result from hard-coded or no credentials in remote access software and the use of outdated applications. Read more ▶

 
 
Image: 3 ways to make your Windows network harder to attack

3 ways to make your Windows network harder to attack

Start the new year right by checking these three areas for potential vulnerabilities in your Windows network. Don't make it easy for attackers. Read more ▶

Image: What is cryptojacking? How to prevent, detect, and recover from it

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it. Read more ▶

Image: CrowdStrike, Ukraine, and the DNC server: Timeline and facts

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

Politicizing cybersecurity only serves to undermine trust in its practices and objectivity, experts fear. Read more ▶

Image: 7 security incidents that cost CISOs their jobs

7 security incidents that cost CISOs their jobs

Whether or not security executives lose their jobs in the wake of a major incident, security failure should be seen as a learning opportunity. Read more ▶

eBook: 15Five

OKRs Guide

This is a resource for managers at all levels to implement the company-wide objectives established by leadership. We’ve included details for working with every employee so that they have measurable objectives that impact the entire company each quarter of the year. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com