CSO

CSO Daily

February 07, 2019

Image: Report: Over 59,000 GDPR data breach notifications, but only 91 fines

Report: Over 59,000 GDPR data breach notifications, but only 91 fines

The low number of fines relative to the volume of reported breaches might be due to over-extended regulators, says a DLA Piper report. Read more ▶

Your Must-Read Stories

•

Vendor allegedly assaults security researcher who disclosed massive vulnerability

•

Bank OZK's vulnerability risk index shows patching priorities everyone understands

•

Power LogOn offers 2FA and networked password management for the enterprise

•

Review: JASK ASOC isn't just another overloaded SIEM

•

How ADP identifies and reduces third-party risk

•

The new CISO's playbook: 5 rules to follow

Miscellaneous: Bsquare

IoT: Enhancing Operations Through Intelligent Maintenance

This webinar will highlight how intelligent maintenance strategies help organizations realize broader operational benefits. Read more ▶

Image: Vendor allegedly assaults security researcher who disclosed massive vulnerability

Vendor allegedly assaults security researcher who disclosed massive vulnerability

A security researcher alleges the COO of Atrient assaulted and threatened him after disclosing a massive vulnerability in an Atrient product. Read more ▶

Image: You can sign up for this team collaboration app for free today

FROM OUR BUSINESS PARTNERS

You can sign up for this team collaboration app for free today

Unlock your team’s full potential with free chat, file sharing, and task management. Read more ▶

Image: Bank OZK's vulnerability risk index shows patching priorities everyone understands

Bank OZK's vulnerability risk index shows patching priorities everyone understands

Explaining vulnerability risk to non-technical executives can be hard. With his CSO50 award-winning Vulnerability Exception Risk Index, Bank OZK CISO Jason Cathey has devised a way to turn vulnerability data into a simple risk metric. Read more ▶

 
 
Image: Power LogOn offers 2FA and networked password management for the enterprise

Power LogOn offers 2FA and networked password management for the enterprise

This authentication tool is simple to set up and use, but the biggest selling point might be workable password management across the enterprise. Read more ▶

Image: Review: JASK ASOC isn't just another overloaded SIEM

Review: JASK ASOC isn't just another overloaded SIEM

The JASK Autonomous Security Operations Center coordinates various alerts and events into a picture of an ongoing threat or attack — the kinds of techniques that human threat hunters employ, only much faster. Read more ▶

Image: How ADP identifies and reduces third-party risk

How ADP identifies and reduces third-party risk

CSO50 award winner ADP's third-party assurance program helps it manage and mitigate risks posed by suppliers and contractors. Read more ▶

Image: The new CISO's playbook: 5 rules to follow

The new CISO's playbook: 5 rules to follow

Today’s privacy and regulatory requirements, breadth of threats and bad employee behavior require chief information security officers to add some new moves to the old playbook. Read more ▶

Video/Webcast: Dell EMC and Intel®

Advances in Data Protection for a Digital World

To out-innovate and out-pace their competition, organizations must be on a consistent path to keep their infrastructure modern. IT is under constant pressure to deliver optimized infrastructure for new business initiatives and supporting applications all while trying to contain or even reduce costs. Download this webcast from Dell EMC and Intel® to learn more. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.