CSO

CSO Daily

January 24, 2020

Image: Insecure configurations expose GE Healthcare devices to attacks

Insecure configurations expose GE Healthcare devices to attacks

The six high-risk vulnerabilities result from hard-coded or no credentials in remote access software and the use of outdated applications. Read more ▶

Your Must-Read Stories

•

The biggest data breach fines, penalties and settlements so far

•

How to implement Windows 7, Server 2008 security updates after end-of-life

•

Catch our new podcast. Tune in now!

•

Data on the rise: 4 new challenges security must master

•

How the Tour de France secures its broadcast from disruption

•

7 security incidents that cost CISOs their jobs

Case Study: Google & TrueFit

ASICS Reports 150% Increase in Conversion, and a 50% Reduction in Size Sampling Returns

In an effort to expand their ecommerce strategy, ASICS set out “to personalize the shopping experience for consumers by finding them products that fit well ”both in terms of size and style. Read more ▶

Image: The biggest data breach fines, penalties and settlements so far

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.45 billion and counting. Read more ▶

Image: Get this essential cloud security certification training bundle for only $49

DEALPOST

Get this essential cloud security certification training bundle for only $49

These web-based courses are perfect for anyone who doesn’t have the time to attend traditional classes Read more ▶

Image: How to implement Windows 7, Server 2008 security updates after end-of-life

How to implement Windows 7, Server 2008 security updates after end-of-life

Microsoft has ended support for Windows 7 and Windows Server 2008, but you can purchase extended security updates. Here's what you need to do to implement them. Read more ▶

 
 
Image: Catch our new podcast. Tune in now!

Catch our new podcast. Tune in now!

In this episode of CSO Executive Sessions, Ken Foster, head of global cyber risk governance at First Data, joins host Bob Bragdon to discusses tracking privacy from a risk standpoint. Read more ▶

Image: Data on the rise: 4 new challenges security must master

Data on the rise: 4 new challenges security must master

Data is information security's bread and butter, but the rise of data brings both new challenges and new opportunities. To meet them, security needs to change its relationship with data. Read more ▶

Image: How the Tour de France secures its broadcast from disruption

How the Tour de France secures its broadcast from disruption

Few sporting events have the scale and logistics challenges that the Tour de France presents. Event organizer ASO uses the cloud and tight physical security to avoid cyberattacks and broadcast integrity. Read more ▶

Image: 7 security incidents that cost CISOs their jobs

7 security incidents that cost CISOs their jobs

Whether or not security executives lose their jobs in the wake of a major incident, security failure should be seen as a learning opportunity. Read more ▶

Miscellaneous: Google & Zenoss

Market Guide for AIOps Platforms

AIOps platforms enhance I&O leaders’ decision making by contextualizing large volumes of varied and volatile data. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com