CSO

CSO Daily

January 23, 2020

Image: Cryptojacking explained: How to prevent, detect, and recover from it

Cryptojacking explained: How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it. Read more ▶

Your Must-Read Stories

•

How the Tour de France secures its broadcast from disruption

•

How to implement Windows 7, Server 2008 security updates after end-of-life

•

Data on the rise: 4 new challenges security must master

•

How Adobe monitors cloud deployments to control shadow IT

•

What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

•

What is a buffer overflow? And how hackers exploit these vulnerabilities

Video/Webcast: InterSystems

Acquiring actionable SDoH with a clean data pipeline

Addressing Social Determinants of Health (SDoH), such as housing instability, represents a significant opportunity to improve overall health and wellness. But to date, much of the evidence on the value of such programs is anecdotal. To identify and scale effective SDoH interventions, we need analytics and measurement powered by comprehensive, clean data. Read more ▶

Image: How the Tour de France secures its broadcast from disruption

How the Tour de France secures its broadcast from disruption

Few sporting events have the scale and logistics challenges that the Tour de France presents. Event organizer ASO uses the cloud and tight physical security to avoid cyberattacks and broadcast integrity. Read more ▶

Image: Get this essential cloud security certification training bundle for only $49

DEALPOST

Get this essential cloud security certification training bundle for only $49

These web-based courses are perfect for anyone who doesn’t have the time to attend traditional classes Read more ▶

Image: How to implement Windows 7, Server 2008 security updates after end-of-life

How to implement Windows 7, Server 2008 security updates after end-of-life

Microsoft has ended support for Windows 7 and Windows Server 2008, but you can purchase extended security updates. Here's what you need to do to implement them. Read more ▶

 
 
Image: Data on the rise: 4 new challenges security must master

Data on the rise: 4 new challenges security must master

Data is information security's bread and butter, but the rise of data brings both new challenges and new opportunities. To meet them, security needs to change its relationship with data. Read more ▶

Image: How Adobe monitors cloud deployments to control shadow IT

How Adobe monitors cloud deployments to control shadow IT

Keeping an eye on your cloud deployments is key to preventing yet another data breach. Adobe's MAVLink program does just that. Read more ▶

Image: What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

Boris Johnson's Withdrawal Agreement Bill (WAB) largely leaves existing data protection regulation in place, but changes are still possible. Read more ▶

Image: What is a buffer overflow? And how hackers exploit these vulnerabilities

What is a buffer overflow? And how hackers exploit these vulnerabilities

A buffer overflow or overrun is a memory safety issue where a program does not properly check the boundaries of an allocated fixed-length memory buffer and writes more data than it can hold. This causes data to overflow to adjacent memory space, overwriting the information there, which often leads to crashes and exploitable conditions. Read more ▶

Research/Infographic: PagerDuty

IDC Snapshot: The ROI of PagerDuty

Check out this Business Value infographic from IDC on the value of PagerDuty, and start learning how to transform your operations today. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com