CSO

CSO Daily

January 22, 2020

Image: How to implement Windows 7, Server 2008 security updates after end-of-life

How to implement Windows 7, Server 2008 security updates after end-of-life

Microsoft has ended support for Windows 7 and Windows Server 2008, but you can purchase extended security updates. Here's what you need to do to implement them. Read more ▶

Your Must-Read Stories

•

What is a buffer overflow? And how hackers exploit these vulnerabilities

•

How Adobe monitors cloud deployments to control shadow IT

•

Data on the rise: 4 new challenges security must master

•

What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

•

US elections remain vulnerable to attacks, despite security improvements

•

Hiring scarce security talent: 8 secrets to working with recruiters

White Paper: CBTS

Building owner’s guide to indoor 5G: When being a “cellular dead zone” is not a competitive advantage

5G networks are no longer a dream of the future. They’re finally here and delivering faster speeds with lower latency. Read more ▶

Image: What is a buffer overflow? And how hackers exploit these vulnerabilities

What is a buffer overflow? And how hackers exploit these vulnerabilities

A buffer overflow or overrun is a memory safety issue where a program does not properly check the boundaries of an allocated fixed-length memory buffer and writes more data than it can hold. This causes data to overflow to adjacent memory space, overwriting the information there, which often leads to crashes and exploitable conditions. Read more ▶

Image: Get this essential cloud security certification training bundle for only $49

DEALPOST

Get this essential cloud security certification training bundle for only $49

These web-based courses are perfect for anyone who doesn’t have the time to attend traditional classes Read more ▶

Image: How Adobe monitors cloud deployments to control shadow IT

How Adobe monitors cloud deployments to control shadow IT

Keeping an eye on your cloud deployments is key to preventing yet another data breach. Adobe's MAVLink program does just that. Read more ▶

 
 
Image: Data on the rise: 4 new challenges security must master

Data on the rise: 4 new challenges security must master

Data is information security's bread and butter, but the rise of data brings both new challenges and new opportunities. To meet them, security needs to change its relationship with data. Read more ▶

Image: What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

Boris Johnson's Withdrawal Agreement Bill (WAB) largely leaves existing data protection regulation in place, but changes are still possible. Read more ▶

Image: US elections remain vulnerable to attacks, despite security improvements

US elections remain vulnerable to attacks, despite security improvements

Continued Russian interference, insecure paperless voting processes will sow doubt about the next election despite some security improvements. Read more ▶

Image: Hiring scarce security talent: 8 secrets to working with recruiters

Hiring scarce security talent: 8 secrets to working with recruiters

Recruiters can be a valuable resource, especially when you're looking to hire for specialized and in-demand skills. Here's how to make the most of the relationship. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com