CSO

CSO Daily

December 20, 2019

Image: Macy’s breach is a game-changing Magecart attack

Macy’s breach is a game-changing Magecart attack

The attackers customized the Magecart code to the Macy's website to steal credit card information in the wallet and new registrations. Read more ▶

Your Must-Read Stories

•

High-profile departures widen federal government’s security talent shortage

•

The biggest data breach fines, penalties and settlements so far

•

The VPN is dying, long live zero trust

•

How to protect your business from holiday attacks

•

Hackers use free tools in new APT campaign against industrial sector firms

•

How Virgin Hyperloop One protects its most precious data

Miscellaneous: Paragon Development Systems, a Hewlett Packard Enterprise Platinum Solution Provider

Upgrade Before the End of Support for Windows Server 2008

The end of support for Windows Server 2008 is coming fast. Bring your company to the next level by upgrading to the latest versions, available on HPE ProLiant Gen10 Servers, powered by Intel® Xeon® Scalable processors. Read more ▶

Image: High-profile departures widen federal government’s security talent shortage

High-profile departures widen federal government’s security talent shortage

Recent key departures--voluntary and forced--might make it harder for government agencies to find the talent needed to fulfill their security missions. Read more ▶

Image: Learn how to be an ethical hacker with this $39 in-depth training bundle

DEALPOST

Learn how to be an ethical hacker with this $39 in-depth training bundle

The A to Z Cyber Security & IT Certification Training Bundle contains 12 courses on how to pinpoint vulnerabilities in network systems and suggest ways to improve. Read more ▶

Image: The biggest data breach fines, penalties and settlements so far

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.45 billion and counting. Read more ▶

 
 
Image: The VPN is dying, long live zero trust

The VPN is dying, long live zero trust

VPNs are part of a security strategy based on the notion of a network perimeter; trusted employees are on the inside and untrusted employees are on the outside. But that model no longer works in a modern business environment where mobile users access the network from a variety of locations and corporate assets reside in multi-cloud environments. Read more ▶

Image: How to protect your business from holiday attacks

How to protect your business from holiday attacks

Attackers see opportunity in the holidays, but these simple steps and considerations can help block their efforts. Read more ▶

Image: Hackers use free tools in new APT campaign against industrial sector firms

Hackers use free tools in new APT campaign against industrial sector firms

Attackers seek to make attribution harder and use sophisticated, realistic spear-phishing emails. Read more ▶

Image: How Virgin Hyperloop One protects its most precious data

How Virgin Hyperloop One protects its most precious data

VHO's high profile means its intellectual property is coveted by competitors, nation-states and curious hackers. Tightly controlled access is the key to protecting that data. Read more ▶

White Paper: GitHub

Six DevOps pitfalls for engineering leaders to avoid

DevOps can be a transformative practice for businesses of all sizes and types. Companies in almost every industry are using DevOps to give teams the time and freedom to tackle more challenging projects. As with all software development strategies, there are some shared pitfalls to watch out for. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2019 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com