Thursday, March 1, 2018

Another massive DDoS internet blackout could be coming your way

Nuance says NotPetya attack led to $98 million in lost revenue

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Mar 01, 2018
Featured Image

Another massive DDoS internet blackout could be coming your way

A massive internet blackout similar to the Dyn DNS outage in 2016 could easily happen again, despite relatively low-cost countermeasures, according to a new study out of Harvard University. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Nuance says NotPetya attack led to $98 million in lost revenue
SEC guidance on IT security: Would you report secure risks before a breach?
Why Splunk acquired Phantom
U.S. cybersecurity threat risk remains high -- no signs of lessening
New Orleans alleged to have secretly used Palantir predictive policing
Salted Hash Ep 20: GDPR: Looming deadlines, massive penalties

White Paper: BugSnag

Speed vs. Stability: Meeting the pressures of modern application development

The success of an application is connected to stability and continuous improvements in capabilities. It's a difficult task for DevOps: rapid, innovative product releases, while maintaining software stability. This white paper explains how to leverage visibility and actionable intelligence to optimize for short development cycles while identifying and correcting errors before they become problems. Read More

Thumbnail Image

Nuance says NotPetya attack led to $98 million in lost revenue

Nuance Communications, a software company that offers speech and imaging technology to a number of markets, including healthcare and finance, said the 2017 NotPetya malware attacks caused the company to lose $98 million in revenue, and that number is expected to grow as they push forward into 2018. Read More

Thumbnail Image

SEC guidance on IT security: Would you report secure risks before a breach?

When organizations can collaborate to prevent data breaches from happening, we can create real security rather than spread fear. Read More

Thumbnail Image

Why Splunk acquired Phantom

With the purchase of Phantom, SIEM leader Splunk wants to capitalize on market momentum and add to its security operations and analytics platform architecture (SOAPA). Read More

Thumbnail Image

U.S. cybersecurity threat risk remains high -- no signs of lessening

The U.S. Director National Intelligence says the public and private sectors in the U.S. are at continual risk and the country should expect cyber attacks from nation state and non-state actors. Read More

Thumbnail Image

New Orleans alleged to have secretly used Palantir predictive policing

The New Orleans Police Department is accused of secretly using Palantir's predictive policing technology to predict who would cause a crime or be a victim of it. Read More

Thumbnail Image

Salted Hash Ep 20: GDPR: Looming deadlines, massive penalties

The May 25 deadline for the General Data Protection Regulation (GDPR) is quickly approaching. Organizations large and small are scrambling to align with these new requirements, but the task isn't an easy one. In fact, the idea of moving information control away from the companies that collect it and into the hands of the consumer is a major change for some organizations. Read More

Research/Infographic: Veracode

Checklist for Security Professionals in a DevSecOps World

The responsibility for ensuring the stability and security of software through production is moving earlier in the cycle to include developers. With this shift, security gets baked into code earlier, greatly increasing the chance of producing secure code without costly late-stage fixes. But what does this shift mean for security professionals? What does their job look like if developers are responsible for security testing? Read More

CSO Insider

1. GDPR and the "right to explanation"
2. The two most important ways to defend against security threats
3. 11 tips for prioritizing security spending
4. 7 threat modeling mistakes you're probably making
5. Mastering email security with DMARC, SPF and DKIM

Editor's Picks

1. What is cryptojacking? How to prevent, detect, and recover from it
2. How to approach a Zero Trust security model for your enterprise
3. 4 reasons forensics will remain a pillar of cybersecurity
4. What's new in Windows 10 security features: The anti-ransomware edition
5. Facebook's free VPN acts like spyware to iOS users in the U.S.
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:10 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive