Thursday, February 26, 2015

Slideshow: If you could go back in time on security

CSO50 2015: Security offers a marketing advantage for ADP.

Anthem: 78.8 million affected, FBI close to naming suspect.

CSO Update
February 26, 2015

Slideshow: If you could go back in time on security

We asked some security experts about what they would change if they could go back... READ MORE

 

Issue highlights

1. CSO50 2015: Security offers a marketing advantage for ADP

2. Anthem: 78.8 million affected, FBI close to naming suspect

3. Security is CIOs' worst nightmare

4. How better log monitoring can prevent data breaches

5. Google scraps annual Pwnium bug-hunting contest

Resource compliments of: Akamai Technologies, Inc.

Creating a Web Security Strategy

Has your organization experienced a web attack recently? How often do you run web vulnerability scans? How could downtime affect your business? Discover what web professionals are thinking when it comes to proactive web security measures Register now to download a free copy of the new CSO Quick Pulse White Paper from Akamai.

CSO50 2015: Security offers a marketing advantage for ADP

Case study: ADP's award-winning payroll vendor management system helps the company serve more international markets and clients than ever before and is, in fact, doing it so well that its managers are routinely asked to sit in on sales meetings with the biggest customers. READ MORE

White Paper: LogMeIn

Re-Evaluating the Role of "Traditional" Audio Conferencing

The audio conferencing market is changing and buyers are starting to move from traditional audio conference providers to integrated audio and web conferencing solutions. Learn More>>

Anthem: 78.8 million affected, FBI close to naming suspect

On Tuesday, Anthem, the nation's second largest health insurer, said that 8.8 to 18.8 million people who were not customers could be impacted by their recent data breach, which at last count is presumed to affect some 78.8 million people. This latest count now includes customers of independent Blue Cross Blue Shield (BCBS) plans in several states. READ MORE

White Paper: Citrix Systems

Comprehensive Enterprise Mobile Management for iOS 8

This white paper provides an overview of the new iOS 8 capabilities in comparison to iOS 7 and how Citrix XenMobile makes it easier to manage iOS 8 devices without compromising the user experience. Learn More

Security is CIOs' worst nightmare

What keeps CIOs awake at night? Worrying about security, downtime and acquiring the right talent, according to a recent survey. READ MORE

How better log monitoring can prevent data breaches

Recent high-profile data breaches reaffirm that the threat from data thieves is both persistent and pervasive. Could better log monitoring mitigate or even prevent these types of security catastrophes? READ MORE

Google scraps annual Pwnium bug-hunting contest

Google is scrapping Pwnium, its annual bug hunting event, and folding it into an existing year-round program in part to reduce security risks. But Tim Willis of the Chrome Security Team wrote in a blog post that the annual event isn't best for either researchers or the company. READ MORE

: BMC Software

Five Key Elements of Complete IT Compliance

In the past, the needs of the business have often overruled the requirements of compliance, but in light of recent security breaches and compliance failures, this attitude is no longer an option. Organizations must modernize their approach to compliance and close the SecOps gap with a strategy designed for today's complex, dynamic IT environments. Learn More

Top 5 Stories

  1. 7 social engineering scams and how to avoid them
  2. Top 10 DNS attacks likely to infiltrate your network
  3. What's wrong with this picture? The NEW clean desk test
  4. The worst of the worst phishing scams
  5. 7 security mistakes people make with their mobile device

Editor's Picks

  1. 15 hot, new security and privacy apps for Android and iOS
  2. How to get creative with your penetration testing
  3. 5 security bolstering strategies that won't break the bank
  4. What's wrong with this picture?The NEW clean desk test
  5. Inside an attack by the Syrian Electronic Army

Follow CSO Online

You are currently subscribed to cso_update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@cxo.com

Copyright (C) 2015 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@csoonline.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive