CSO

CSO Daily

July 24, 2019

Image: Equifax’s data breach disaster: Will it change executive attitudes toward security?

Equifax’s data breach disaster: Will it change executive attitudes toward security?

Equifax's 2017 breach will cost it billions in fines, customer restitution and mandated and voluntary security improvements. All organizations that profit from consumer data should take notice. Read more ▶

Your Must-Read Stories

•

Hunting vintage MS-DOS viruses from Cuba to Pakistan

•

How to set up Microsoft Azure AD Identity Protection to spot risky users

•

31 hardware and firmware vulnerabilities: A guide to the threats

•

Review: How Barac ETV analyzes encrypted data streams

•

California Consumer Privacy Act (CCPA): What you need to know to be compliant

•

The 6 best password managers

Video/Webcast: Iron Mountain

Securing Your Brand With Secure IT Asset Disposition

In this webcast, Christopher Greene of Iron Mountain joins IDG Content Director Joan Goodchild to discuss best practices for Secure IT Asset Disposition (SITAD) and what businesses need to know to dispose and remarket assets securely and lawfully Read more ▶

Image: Hunting vintage MS-DOS viruses from Cuba to Pakistan

Hunting vintage MS-DOS viruses from Cuba to Pakistan

Security researchers and enthusiasts try to understand and preserve the history of malware. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: How to set up Microsoft Azure AD Identity Protection to spot risky users

How to set up Microsoft Azure AD Identity Protection to spot risky users

Whichever license of Azure Active Directory you own, you have options to set up alerts and automate actions to risky user behavior. Read more ▶

 
 
Image: 31 hardware and firmware vulnerabilities: A guide to the threats

31 hardware and firmware vulnerabilities: A guide to the threats

Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats. Read more ▶

Image: Review: How Barac ETV analyzes encrypted data streams

Review: How Barac ETV analyzes encrypted data streams

Barac’s Encrypted Traffic Visibility Platform can halt encrypted attacks — without breaking the encryption. In our tests, the results seemed mostly instantaneous. Read more ▶

Image: California Consumer Privacy Act (CCPA): What you need to know to be compliant

California Consumer Privacy Act (CCPA): What you need to know to be compliant

California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change. Read more ▶

Image: The 6 best password managers

The 6 best password managers

Look to these top password managers for Windows, MacOS, iOS and Android to make your online life easier and more secure. Read more ▶

White Paper: Lenovo

Why Lenovo For Higher Education

Colleges and universities are transforming to meet the demands of new students. Technology plays a critical role in making improvements to both physical and process infrastructure. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.