Wednesday, January 24, 2018

Top 5 cybersecurity facts, figures and statistics for 2018

UPDATED: Allscripts recovering from ransomware attack that has kept key tools offline

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jan 24, 2018
Featured Image

Top 5 cybersecurity facts, figures and statistics for 2018

Predictions and observations provide a 30,000-foot view of the cybersecurity industry. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

UPDATED: Allscripts recovering from ransomware attack that has kept key tools offline
Amazon Is Offering a $40-Off Deal On Its Echo Spot Devices
Hackers could have exploited flaw in all Blizzard games
Endpoint detection and response is coming - in one form or another
6 reasons you're failing to focus on your biggest IT security threats
Rating software security Consumer Reports-style

White Paper: Sophos

A Coming Flood or a Distant Storm? The GDPR from a North American Perspective

The General Data Protection Regulation (GDPR) is a legislative framework valid across all the European Union (EU) states, replacing a patchwork of country-specific legislations. It is a law that is designed to strengthen the privacy and protect data for individuals across all the EU countries by requiring companies to adopt new data protection processes and controls. Read More

Thumbnail Image

UPDATED: Allscripts recovering from ransomware attack that has kept key tools offline

Allscripts, the billion-dollar electronic health record (EHR) company headquartered in Chicago, IL said they were still working to recover from a ransomware attack that left several applications offline after data centers in Raleigh and Charlotte, NC were infected on Thursday. Read More

Thumbnail Image
DealPost

Amazon Is Offering a $40-Off Deal On Its Echo Spot Devices

For the first time, Amazon has discounted its Echo Spot device by $40 when you buy a pair of them. Read More

Thumbnail Image

Hackers could have exploited flaw in all Blizzard games

Blizzard stopped talking with the Google security researcher who discovered the flaw and bungled the silently deployed patch to stop hackers from hijacking millions of PCs. Read More

Thumbnail Image

Endpoint detection and response is coming - in one form or another

Vendors are bundling endpoint detection and response (EDR) into endpoint security suites. CISOs want it, but they aren't sure how to consume it. Read More

Thumbnail Image
INSIDER

6 reasons you're failing to focus on your biggest IT security threats

Most companies are not focused on the real security threats they face, leaving them ever more vulnerable. That can change if they trust their data rather than the hype. Read More

Thumbnail Image
INSIDER

Rating software security Consumer Reports-style

The Cyber Independent Testing Lab (CITL) is fuzzing binaries at scale and building a checklist of compile-time security best practices. Read More

KnowledgeVault: Bitsight

Agile and Secure? Update Your Vendor Relationship Management (VRM) Strategy

Organizations are increasing their use of third-party partners for outsourcing-but these partnerships can create security risks. Businesses need a way to quickly assess the security risk of new vendors, which is where a strong Vendor Relationship Management (VRM) strategy comes into play. Learn how partnering with the right VRM provider can help address risks in real time, speed-up decision making, and enable business growth. Read More

CSO Insider

1. Top security certifications: Who they're for, what they cost, and which you need
2. How to jumpstart your infosec career
3. For strong API security, you need a program not a piecemeal approach
4. Security platform or best of breed? There's only one answer
5. Keeping pace with security automation

Editor's Picks

1. What is SSL/TLS? (And why it's time to upgrade to TLS 1.3)
2. Meltdown and Spectre patches: Where to start and what to expect
3. The dirty dozen: 12 top cloud security threats for 2018
4. Best Android antivirus? The top 10 tools
5. The 6 best password managers
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:03 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive