CSO

CSO Update

October 10, 2019

Image: Rebuilding after NotPetya: How Maersk moved forward

Rebuilding after NotPetya: How Maersk moved forward

In the wake of NotPetya attacks, Maersk's IT and security teams embraced transparency, greater collaboration with business, and a risk-based approach. Read more ▶

Your Must-Read Stories

5 OT security takeaways CISOs need to communicate to stakeholders

Critical remote code execution flaw fixed in popular terminal app for macOS

3 actions to take during cybersecurity awareness month

Speaker disinvites at CyberCon spark controversy

6 known RCE vulnerabilities in enterprise VPNs and how to minimize the risk

Presidential campaign websites fail at privacy, new study shows

White Paper: Matillion

Optimizing Business Analytics by Transforming Data in the Cloud

Companies understand the value of data. But before data can be analyzed, it must be collected and prepared for analytics engines, and this process can be inefficient and costly. Read more ▶

Image: 5 OT security takeaways CISOs need to communicate to stakeholders

5 OT security takeaways CISOs need to communicate to stakeholders

Operational technology security requires a different approach than IT security. Here are key takeaways CSOs need to communicate to other executives and boards of directors. Read more ▶

Image: Master data analytics and deep learning with this $35 Python certification bundle

DEALPOST

Master data analytics and deep learning with this $35 Python certification bundle

The Complete Python Certification Bootcamp Bundle contains 12 courses on how to use Python for apps, data analysis, deep learning, and more. Read more ▶

Image: Critical remote code execution flaw fixed in popular terminal app for macOS

Critical remote code execution flaw fixed in popular terminal app for macOS

Users of the iTerm2 terminal app are encouraged to update as soon as possible. Read more ▶

 
 
Image: 3 actions to take during cybersecurity awareness month

3 actions to take during cybersecurity awareness month

Based on recent research, improving cybersecurity awareness among business executives, CIOs, and, yes, infosec professionals should be a goal for any organization. Read more ▶

Image: Speaker disinvites at CyberCon spark controversy

Speaker disinvites at CyberCon spark controversy

NSA whistleblower Thomas Drake and Australian academic Dr. Suelette Dreyfus disinvited from speaking at CyberCon a week before the conference. Read more ▶

Image: 6 known RCE vulnerabilities in enterprise VPNs and how to minimize the risk

6 known RCE vulnerabilities in enterprise VPNs and how to minimize the risk

Enterprise VPNs might not always be as safe as you think. Be aware of these RCE vulnerabilities in popular enterprise VPN solutions. Read more ▶

Image: Presidential campaign websites fail at privacy, new study shows

Presidential campaign websites fail at privacy, new study shows

A non-partisan analysis of 23 presidential campaign websites reveals glaring privacy issues. Read more ▶

Case Study: Etleap

Etleap Data Governance Case Study

Leading security firm reduces risk and unifies data for analysis while meeting GDPR requirements. Etleap and AWS help Okta source data with an analyst-friendly, governed ETL solution. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.