Everyone should employ an intrusion detection system (IDS) to monitor their network and flag any suspicious activity or automatically shut down potentially malicious traffic. We look at five of the best open source options. Read More ▶ | | | How the OPM hack happened, the technical details, and a timeline of the infiltration and response. Read More ▶ | | CSO Online's calendar of upcoming security conferences makes it easy to find the events that matter the most to you. Read More ▶ | | | The GDPR and other privacy regulations are creating new opportunities for cyber criminals and roadblocks for security teams, while in some cases putting personal data at greater risk. Read More ▶ | | Antivirus software can't keep up with new malware or variants of known malware, but it still plays a role in an overall endpoint protection strategy. Read More ▶ | | Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes, have cost these eight companies a total of nearly $280 million and counting. Read More ▶ | | Editor's Picks | | | Get Security Smart From the editors of CSO, Security Smart is a quarterly security awareness newsletter ready for distribution in your organization. Subscribe now and arm your employees with the information they need to be more secure at home and at work. Learn more. | | | | |
0 comments:
Post a Comment