Panera Bread blew off breach report for 8 months, leaked millions of customer records

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Apr 04, 2018
Featured Image

How to detect and prevent crypto mining malware

Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Panera Bread blew off breach report for 8 months, leaked millions of customer records
Get a 299-Piece All-Purpose First Aid Kit For $12 Today
RSA Conference: CISOs' top 4 cybersecurity priorities
Open source software security challenges persist
What is Mitre's ATT&CK framework? What red teams need to know
Don’t rush to deploy 5G if you want IoT security, agency warns

White Paper: Neustar Inc

5 Ways To Strengthen Your DNS

DNS might be your most vital, yet underrated component of your company's security posture. As the protocol responsible for everything from your website's availability to its performance, your DNS is critical, but how secure is it? Read More

Thumbnail Image

Panera Bread blew off breach report for 8 months, leaked millions of customer records

As many as 37 million customer records were exposed thanks to a security vulnerability that Panera Bread chose to ignore for eight months. Read More

Thumbnail Image
DealPost

Get a 299-Piece All-Purpose First Aid Kit For $12 Today

The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More

Thumbnail Image

RSA Conference: CISOs' top 4 cybersecurity priorities

When cybersecurity executives head to the RSA Conference, they will be looking for information about threat intelligence, SOAPA, business risk, and changing security perimeters. Read More

Thumbnail Image

Open source software security challenges persist

Using open source components saves developers time and companies money. In other words, it's here to stay. Here's a look at what it will take to improve open source security. Read More

Thumbnail Image

What is Mitre's ATT&CK framework? What red teams need to know

The ATT&CK framework allows security researchers and red teams to better understand hacker threats. Read More

Thumbnail Image

Don’t rush to deploy 5G if you want IoT security, agency warns

Flaws in 2G, 3G and 4G networks could be repeated in 5G, says EU IT security agency. Read More

eBook: F5 Networks

Choosing the Right Model: A Guide to DDoS Protection

Always-on, always-connected apps can help power and transform your business- but they can also act as gateways to data beyond the protections of your firewalls. With most attacks happening at the app level, protecting the capabilities that drive your business means protecting the apps that make them happen. Read More

CSO Insider

1. 14 top tools to assess, implement, and maintain GDPR compliance
2. What are the GDPR requirements?
3. Third-party security vetting: Do it before you sign a contract
4. Separation of duties and IT security
5. Review: Bricata adds threat hunting to traditional IPS/IDS

Editor's Picks

1. Rogues' gallery: 7 insiders who breached security
2. Why you don't need an RFID-blocking wallet
3. The 6 best password managers
4. 8 hot cyber security trends (and 4 going cold)
5. The 10 Windows group policy settings you need to get right
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.