CSO

CSO Daily

May 21, 2019

Image: IT services giant HCL left employee passwords, other sensitive data exposed online

IT services giant HCL left employee passwords, other sensitive data exposed online

HCL left employee passwords, customer project details, and other sensitive information exposed online with no authentication. Read more ▶

Your Must-Read Stories

•

How to implement and use the MITRE ATT&CK framework

•

Haas F1 team leans on service providers as security force multipliers

•

Does it matter who the CISO reports to?

•

Will the U.S. government draft cybersecurity professionals?

•

The second Meltdown: New Intel CPU attacks leak secrets

•

Microsoft urges Windows customers to patch wormable RDP flaw

White Paper: Bluecat Networks

Cost of Free Abstract

Whether it’s human error, lack of automation, zero visibility, no security, inflexible architecture, or downtime, all these DNS challenges are costing you. Read more ▶

Image: How to implement and use the MITRE ATT&CK framework

How to implement and use the MITRE ATT&CK framework

The MITRE ATT&CK framework is a popular template for building detection and response programs. Here's what you'll find in its knowledgebase and how you can apply it to your environment. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Haas F1 team leans on service providers as security force multipliers

Haas F1 team leans on service providers as security force multipliers

Formula One racing is expensive and comes with significant security concerns. An outsource-first policy lets a small security team effectively deal with threats at multiple locations. Read more ▶

 
 
Image: Does it matter who the CISO reports to?

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness. Read more ▶

Image: Will the U.S. government draft cybersecurity professionals?

Will the U.S. government draft cybersecurity professionals?

A Congressional commission might soon recommend conscription of cybersecurity professionals to serve in both the military and civil service. Will the government force security pros to work for Uncle Sam? Read more ▶

Image: The second Meltdown: New Intel CPU attacks leak secrets

The second Meltdown: New Intel CPU attacks leak secrets

Intel has done some mitigations for these vulnerabilities that can leak secrets from virtual machines, secure enclaves and kernel memory. Here's how the attacks work. Read more ▶

Image: Microsoft urges Windows customers to patch wormable RDP flaw

Microsoft urges Windows customers to patch wormable RDP flaw

A newly found vulnerability allows remote exploits using the Remote Desktop Protocol to gain full access to systems with no authentication. Read more ▶

Miscellaneous: Base2 Solutions

Digital Innovation: 7 Steps To Success

Being able to compete in today’s ever-changing climate requires embracing Digital Innovation – new technologies, methodologies and culture – to accelerate and improve product development. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.