Monday, April 16, 2018

Ransomware, healthcare and incident response: Lessons from the Allscripts attack

RSA Conference: CISOs' top 4 cybersecurity priorities

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Apr 16, 2018
Featured Image

Ransomware, healthcare and incident response: Lessons from the Allscripts attack

The actors behind SamSam launched a devastating attack against Allscripts in January, 2018. As Allscripts worked its incident response plan, things started to unravel. Here are the lessons learned. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

RSA Conference: CISOs' top 4 cybersecurity priorities
Get a 299-Piece All-Purpose First Aid Kit For $12 Today
New CISO appointments, April 2018
4 open-source Mitre ATT&CK test tools compared
How to detect and prevent crypto mining malware
Open source software security challenges persist

White Paper: Webroot Software

2018 Webroot Threat Report

The 2018 edition of our annual Threat Report shares a glimpse into our discoveries and analysis of threat activity throughout 2017, to equip you with the knowledge you need to overcome modern cybercrime. Read More

Thumbnail Image

RSA Conference: CISOs' top 4 cybersecurity priorities

When cybersecurity executives head to the RSA Conference, they will be looking for information about threat intelligence, SOAPA, business risk, and changing security perimeters. Read More

Thumbnail Image
DealPost

Get a 299-Piece All-Purpose First Aid Kit For $12 Today

The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More

Thumbnail Image

New CISO appointments, April 2018

Find up-to-date news of CSO, CISO and other senior security executive appointments. Read More

Thumbnail Image
INSIDER

4 open-source Mitre ATT&CK test tools compared

Any of these tools from Endgame, Red Canary, Mitre, and Uber will get your red team and pentesters started with Mitre's ATT&CK framework. Read More

Thumbnail Image

How to detect and prevent crypto mining malware

Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm. Read More

Thumbnail Image

Open source software security challenges persist

Using open source components saves developers time and companies money. In other words, it's here to stay. Here's a look at what it will take to improve open source security. Read More

White Paper: QTS

A New Era: Hybrid IT and the Fully-Integrated Provider

In every industry, IT professionals are watching their roles and objectives evolve rapidly. The world is now digital and data is at the core of how enterprises, governments and individuals manage their core functions. The impact of data is being felt beyond the IT department; it is reverberating through every aspect of our lives. Read More

CSO Insider

1. 14 top tools to assess, implement, and maintain GDPR compliance
2. What are the GDPR requirements?
3. Third-party security vetting: Do it before you sign a contract
4. Separation of duties and IT security
5. Review: Bricata adds threat hunting to traditional IPS/IDS

Editor's Picks

1. Rogues' gallery: 7 insiders who breached security
2. Why you don't need an RFID-blocking wallet
3. The 6 best password managers
4. 8 hot cyber security trends (and 4 going cold)
5. The 10 Windows group policy settings you need to get right
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:04 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive