CSO

CSO Daily

October 09, 2019

Image: Rebuilding after NotPetya: How Maersk moved forward

Rebuilding after NotPetya: How Maersk moved forward

In the wake of NotPetya attacks, Maersk’s IT and security teams embraced transparency, greater collaboration with business, and a risk-based approach. Read more ▶

Your Must-Read Stories

•

6 known RCE vulnerabilities in enterprise VPNs and how to minimize the risk

•

How Hybrid Cloud Simplifies Data Sovereignty Challenges

•

Speaker disinvites at CyberCon spark controversy

•

5 OT security takeaways CISOs need to communicate to stakeholders

•

Directory traversal explained: Definition, examples and prevention

•

7 ways 5G mobile networks will change IoT security, and how to prepare

White Paper: TSA, a Hewlett Packard Enterprise Platinum Partner

How HPE SimpliVity Streamlines IT Operations

Hyperconverged infrastructure brings cloud agility, scalability, and simplicity to data centers. Read this White Paper to learn how HPE SimpliVity, powered by Intel® Xeon® Scalable processors, combines infrastructure and advanced data services to help businesses streamline their IT operations. Read more ▶

Image: 6 known RCE vulnerabilities in enterprise VPNs and how to minimize the risk

6 known RCE vulnerabilities in enterprise VPNs and how to minimize the risk

Enterprise VPNs might not always be as safe as you think. Be aware of these RCE vulnerabilities in popular enterprise VPN solutions. Read more ▶

Image: Learn how to invest & save for your future with GoBankingRates.com

DEALPOST

Learn how to invest & save for your future with GoBankingRates.com

Read more ▶

Image: How Hybrid Cloud Simplifies Data Sovereignty Challenges

BrandPost Sponsored by HPE

How Hybrid Cloud Simplifies Data Sovereignty Challenges

Read more ▶

 
 
Image: Speaker disinvites at CyberCon spark controversy

Speaker disinvites at CyberCon spark controversy

NSA whistleblower Thomas Drake and Australian academic Dr. Suelette Dreyfus disinvited from speaking at CyberCon a week before the conference. Read more ▶

Image: 5 OT security takeaways CISOs need to communicate to stakeholders

5 OT security takeaways CISOs need to communicate to stakeholders

Operational technology security requires a different approach than IT security. Here are key takeaways CSOs need to communicate to other executives and boards of directors. Read more ▶

Image: Directory traversal explained: Definition, examples and prevention

Directory traversal explained: Definition, examples and prevention

In a path traversal attack, also known as directory traversal, an attacker enters information in a web form, URL address line, or another input method that gives them access to a file or directory that they shouldn't have access to. Jira is just the most recent company to expose its customers via a path traversal vulnerability. This risk is easily avoidable, but developers keep making the same mistake. Read more ▶

Image: 7 ways 5G mobile networks will change IoT security, and how to prepare

7 ways 5G mobile networks will change IoT security, and how to prepare

Every internet of things security issue will be greatly magnified in a 5G environment. Address these seven areas before you deploy your own. Read more ▶

Miscellaneous: TSA, a Hewlett Packard Enterprise Platinum Partner

Drive True Hyperconvergence From the Core to the Edge

Hyperconvergence empowers IT teams to manage storage, compute, networking, and virtualization with the same hardware. Read this solution brief to learn how HPE SimpliVity, powered by Intel® Xeon® Scalable processors, drives true hyperconvergence at scale — from the core to the edge. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.