Thursday, March 15, 2018

8 hot cyber security trends (and 4 going cold)

What is security's role in digital transformation?

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Mar 15, 2018
Featured Image
INSIDER

8 hot cyber security trends (and 4 going cold)

What trends do security pros have their eyes on? Their answers run the gamut from tools and technologies to threats, tactics, and training. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What is security's role in digital transformation?
Who owns identity and access management?
3 areas in which CISOs are becoming more proactive
Avoiding security event information overload
5 biggest healthcare security threats for 2018
Security vs. visibility: Why TLS 1.3 has data center admins worried

White Paper: Okta

4 Myths About Credential Phishing

When it comes to phishing, knowledge is power. We tend to underestimate the impact of phishing on the enterprise and assume our existing defense strategies are sufficient to combat these attacks. Read More

Thumbnail Image

What is security's role in digital transformation?

Digital transformation is front of mind for many senior executives, but too often security is left behind. Read More

Thumbnail Image

Who owns identity and access management?

Learn the best practices for integrating identity management into your business while also staying ahead of cutting edge competition. Read More

Thumbnail Image

3 areas in which CISOs are becoming more proactive

Security executives are taking a hands-on approach in areas such as threat intelligence, privacy, and business initiatives. Read More

Thumbnail Image

Avoiding security event information overload

Choose a security event information management (SEIM) vendor that helps you focus on only the security event data that needs to be investigated. Read More

Thumbnail Image
INSIDER

5 biggest healthcare security threats for 2018

Healthcare continues to be a popular target for ransomware, cryptomining, data theft, phishing, and insider threats. Read More

Thumbnail Image
INSIDER

Security vs. visibility: Why TLS 1.3 has data center admins worried

A number of data center administrators from large financial, health care and retail corporations have begun to regard the current draft of the 1.3 version of the TLS protocol with increasing alarm. The issue comes down the tussle between security and visibility. Read More

Video/Webcast: PagerDuty

52% of Companies Sacrifice Cybersecurity for Speed

A recent Threat Stack survey finds that over 50% of companies admit to cutting back on security measures to meet a business deadline or objective. As long as companies are willing to sacrifice security at the altar of speed, the long-held dream of marrying DevOps and security simply won't come true. Read More

CSO Insider

1. What is personally identifiable information (PII)? How to protect it under GDPR
2. What are the GDPR requirements?
3. Fraud prevention: Improving internal controls
4. Why are organizations worldwide failing at cloud data security?
5. Separation of duties and IT security

Editor's Picks

1. 10 questions to answer before running a capture the flag (CTF) contest
2. Insecure by design: What you need to know about defending critical infrastructure
3. Recent cyber attacks show disturbing trends
4. The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet
5. What is a virtual CISO? When and how to hire one
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:03 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive