Voting machine vendor firewall config, passwords posted on public support forum

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Apr 05, 2018
Featured Image

What happens when half the nation's information gets stolen?

The Equifax data breach exposed personal account data for nearly half of all adult Americans. Now that it’s in the hands of criminals, we need to reconsider traditional approaches to financial identity verification. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Voting machine vendor firewall config, passwords posted on public support forum
How to detect and prevent crypto mining malware
What is a supply chain attack? Why you should be wary of third-party providers
RSA Conference: CISOs' top 4 cybersecurity priorities
What is Mitre's ATT&CK framework? What red teams need to know
What is FedRAMP? How cloud providers get authorized to work with the U.S. government

White Paper: Freudenberg IT LP (FIT)

Big Data and Analytics What You Should Know

Data is the raw material of successful companies. For example, a plane can generate 10 terabytes of data in 30 minutes. With 25,000 flights a day, that is a lot of data. New insights that emerge from managing and analyzing data is the task of big data. Find out what you should know about big data. Read More

Thumbnail Image

Voting machine vendor firewall config, passwords posted on public support forum

"This is gold" for a nation-state attacker that wanted to hack an election. Read More

Thumbnail Image

How to detect and prevent crypto mining malware

Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm. Read More

Thumbnail Image

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk. Read More

Thumbnail Image

RSA Conference: CISOs' top 4 cybersecurity priorities

When cybersecurity executives head to the RSA Conference, they will be looking for information about threat intelligence, SOAPA, business risk, and changing security perimeters. Read More

Thumbnail Image

What is Mitre's ATT&CK framework? What red teams need to know

The ATT&CK framework allows security researchers and red teams to better understand hacker threats. Read More

Thumbnail Image

What is FedRAMP? How cloud providers get authorized to work with the U.S. government

The process for getting the FedRAMP seal of approval is complex, but it can ultimately be lucrative for companies that meet the security requirements. Read More

Video/Webcast: NetApp

Accelerate Innovation, Application Performance, and ROI with NetApp

IT leaders are being asked to help set their businesses apart in a global, digital, and mobile world. Fast response times are needed to deliver customer satisfaction, but that is just part of the story. The ability to deliver rock-solid application performance and compelling ROI are must-haves for any digital transformation project. Read More

CSO Insider

1. 14 top tools to assess, implement, and maintain GDPR compliance
2. What are the GDPR requirements?
3. Third-party security vetting: Do it before you sign a contract
4. Separation of duties and IT security
5. Review: Bricata adds threat hunting to traditional IPS/IDS

Editor's Picks

1. Rogues' gallery: 7 insiders who breached security
2. Why you don't need an RFID-blocking wallet
3. The 6 best password managers
4. 8 hot cyber security trends (and 4 going cold)
5. The 10 Windows group policy settings you need to get right
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.