CSO

CSO Update

January 28, 2020

Image: Implementation flaws make LoRaWAN networks vulnerable to attack

Implementation flaws make LoRaWAN networks vulnerable to attack

New report from IOActive details implementation errors that expose LoRaWAN networks to attack and provides a framework for mitigating the risk. Read more ▶

Your Must-Read Stories

Magecart-related arrests made in Indonesia

5 ways to cope with the cybersecurity skills shortage (that don't involve hiring)

The 9 Windows Server security settings you need to get right

Insecure configurations expose GE Healthcare devices to attacks

Data on the rise: 4 new challenges security must master

Winning the war for cybersecurity talent

Video/Webcast: CENTURYLINK

UC&C: The Market, the Challenges, and the Solutions

Join us for a discussion of the challenges and solutions around UC&C with Courtney Munroe, Group Vice President, Worldwide Communications, IDC, and Craig Richter, Senior Director, Product Management UC&C, CenturyLink. Read more ▶

Image: Magecart-related arrests made in Indonesia

Magecart-related arrests made in Indonesia

The three individuals arrested represent only a small portion of the Magecart web-skimming group, but the investigation is ongoing. Read more ▶

Image: Get this essential cloud security certification training bundle for only $49

DEALPOST

Get this essential cloud security certification training bundle for only $49

These web-based courses are perfect for anyone who doesn't have the time to attend traditional classes Read more ▶

Image: 5 ways to cope with the cybersecurity skills shortage (that don't involve hiring)

5 ways to cope with the cybersecurity skills shortage (that don't involve hiring)

Unable to hire their way out of cybersecurity staffing problems, CISOs are turning to process automation, advanced analytics, and third-party services, among other methods. Read more ▶

 
 
Image: The 9 Windows Server security settings you need to get right

The 9 Windows Server security settings you need to get right

With all the improvements Microsoft has made in Windows and Windows Server, it's time to evaluate whether your security settings are as effective as they could be. Read more ▶

Image: Insecure configurations expose GE Healthcare devices to attacks

Insecure configurations expose GE Healthcare devices to attacks

The six high-risk vulnerabilities result from hard-coded or no credentials in remote access software and the use of outdated applications. Read more ▶

Image: Data on the rise: 4 new challenges security must master

Data on the rise: 4 new challenges security must master

Data is information security's bread and butter, but the rise of data brings both new challenges and new opportunities. To meet them, security needs to change its relationship with data. Read more ▶

Image: Winning the war for cybersecurity talent

Winning the war for cybersecurity talent

Security leaders say they expect demand for talent to outstrip supply for at least the next several years. Your task: develop staffing plans that recognize that reality. Read more ▶

eBook: ServiceNow Inc

Where is IT today?

Business transformation is essential for an organization to stay competitive in today's market. And IT can be an important partner in the transformation. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com