CSO

CSO Daily

January 28, 2020

Image: The 9 Windows Server security settings you need to get right

The 9 Windows Server security settings you need to get right

With all the improvements Microsoft has made in Windows and Windows Server, it’s time to evaluate whether your security settings are as effective as they could be. Read more ▶

Your Must-Read Stories

•

5 ways to cope with the cybersecurity skills shortage (that don't involve hiring)

•

Magecart-related arrests made in Indonesia

•

Implementation flaws make LoRaWAN networks vulnerable to attack

•

Closing the security gap in OT/IT convergence

•

Insecure configurations expose GE Healthcare devices to attacks

•

3 ways to make your Windows network harder to attack

Video/Webcast: CENTURYLINK

UC&C: The Market, the Challenges, and the Solutions

Join us for a discussion of the challenges and solutions around UC&C with Courtney Munroe, Group Vice President, Worldwide Communications, IDC, and Craig Richter, Senior Director, Product Management UC&C, CenturyLink. Read more ▶

Image: 5 ways to cope with the cybersecurity skills shortage (that don't involve hiring)

5 ways to cope with the cybersecurity skills shortage (that don't involve hiring)

Unable to hire their way out of cybersecurity staffing problems, CISOs are turning to process automation, advanced analytics, and third-party services, among other methods. Read more ▶

Image: Get this essential cloud security certification training bundle for only $49

DEALPOST

Get this essential cloud security certification training bundle for only $49

These web-based courses are perfect for anyone who doesn’t have the time to attend traditional classes Read more ▶

Image: Magecart-related arrests made in Indonesia

Magecart-related arrests made in Indonesia

The three individuals arrested represent only a small portion of the Magecart web-skimming group, but the investigation is ongoing. Read more ▶

 
 
Image: Implementation flaws make LoRaWAN networks vulnerable to attack

Implementation flaws make LoRaWAN networks vulnerable to attack

New report from IOActive details implementation errors that expose LoRaWAN networks to attack and provides a framework for mitigating the risk. Read more ▶

Image: Closing the security gap in OT/IT convergence

Closing the security gap in OT/IT convergence

End-to-end security between converging information technology and operational technology worlds is imperative, but technical and cultural differences separate them. Here’s how to close the gap. Read more ▶

Image: Insecure configurations expose GE Healthcare devices to attacks

Insecure configurations expose GE Healthcare devices to attacks

The six high-risk vulnerabilities result from hard-coded or no credentials in remote access software and the use of outdated applications. Read more ▶

Image: 3 ways to make your Windows network harder to attack

3 ways to make your Windows network harder to attack

Start the new year right by checking these three areas for potential vulnerabilities in your Windows network. Don't make it easy for attackers. Read more ▶

eBook: ServiceNow Inc

Where is IT today?

Business transformation is essential for an organization to stay competitive in today’s market. And IT can be an important partner in the transformation. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com