CSO

CSO Daily

October 17, 2019

Image: Cryptojacking worm infects exposed Docker deployments

Cryptojacking worm infects exposed Docker deployments

Graboid is the first known instance of a cryptomining worm used to create botnets spread using containers. Read more ▶

Your Must-Read Stories

•

10 risk factors no one talks about

•

Top Linux antivirus software

•

The CISO’s newest responsibility: Building trust

•

Equifax data breach FAQ: What happened, who was affected, what was the impact?

•

Top Considerations for Implementing a Hybrid Cloud Environment

•

Global Data Protection and the right to be forgotten

Miscellaneous: ServiceNow Inc

IDC: The journey towards continuous IT operations in the cloud

With the move to multicloud and DevOps comes complexity and accelerated development cycles. IT operations is being hindered by the lack of visibility between clouds and on-premise resources. Multicloud capabilities need to enable operations to move to a proactive posture, have end to end visibility, and operation at scale. Get the IDC brief to learn more. Read more ▶

Image: 10 risk factors no one talks about

10 risk factors no one talks about

These risk factors might not show up on an official risk assessment report, but every security professional should be thinking about them. Read more ▶

Image: Train to be an in-demand DevOps pro for just $39

DEALPOST

Train to be an in-demand DevOps pro for just $39

Tech companies are always looking for more ways to increase efficiency, and today, DevOps is the way they're doing it. Read more ▶

Image: Top Linux antivirus software

Top Linux antivirus software

Malware attacks on Linux systems are on the rise. These free and low-cost tools provide good endpoint protection. Read more ▶

 
 
Image: The CISO’s newest responsibility: Building trust

The CISO’s newest responsibility: Building trust

Trust is becoming a differentiator in the marketplace, and CISOs who seek a more strategic role in their must engage the full range of stakeholders to build confidence that the organization has their best interests in mind. Read more ▶

Image: Equifax data breach FAQ: What happened, who was affected, what was the impact?

Equifax data breach FAQ: What happened, who was affected, what was the impact?

In 2017, personally identifying data of hundreds of millions of people was stolen from credit reporting agency Equifax. Here's a timeline of what happened, how it happened, and the impact. Read more ▶

Image: Top Considerations for Implementing a Hybrid Cloud Environment

BrandPost Sponsored by HPE

Top Considerations for Implementing a Hybrid Cloud Environment

The compelling economics, efficiency, and agility of hybrid clouds in the enterprise are driving out older approaches. Read more ▶

Image: Global Data Protection and the right to be forgotten

Global Data Protection and the right to be forgotten

Will the United States ever get its own privacy law? Read more ▶

eBook: ServiceNow Inc

5 Steps to Successfully Deploying a Healthy CMDB

Get a detailed roadmap for successfully deploying your CMDB with this guide. Get started on the road to improved business service health today. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.