Thursday, November 1, 2018

Automating security at AWS: How Amazon Web Services operates with no SOC

4 dangerous security assumptions to avoid

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Nov 01, 2018
Featured Image
INSIDER

Automating security at AWS: How Amazon Web Services operates with no SOC

Amazon Web Services CISO Stephen Schmidt explains the company's recipe for combining security automation with ways to get management and staff to take security seriously. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

4 dangerous security assumptions to avoid
Why the best antivirus software isn't enough (and why you still need it)
Cyber threats fueled by AI: Security's next big challenge
Is your security operations center TTP0?
7 unexpected ways GDPR and other privacy regulations make security harder
Application security basics: A process and tools for securing software
Thumbnail Image
INSIDER

4 dangerous security assumptions to avoid

Many organizations take steps to guard against data breaches, employing new policies, tools and strategies that make them feel protected, but their defenses may not be as strong as they think. Unfortunately, this false sense of security is all-too-easy to come by. Read More

Thumbnail Image
INSIDER

Why the best antivirus software isn't enough (and why you still need it)

Antivirus software can't keep up with new malware or variants of known malware, but it still plays a role in an overall endpoint protection strategy. Read More

Thumbnail Image
INSIDER

Cyber threats fueled by AI: Security's next big challenge

Security has always been an arms race. But the addition of AI is like jumping from tomahawks to Tomahawk missiles. Read More

Thumbnail Image
INSIDER

Is your security operations center TTP0?

The new TTP0 community wants to do for SOCs what OWASP has done for web security. It will help CISOs improve their threat intelligence and threat hunting capabilities as well. Read More

Thumbnail Image
INSIDER

7 unexpected ways GDPR and other privacy regulations make security harder

The GDPR and other privacy regulations are creating new opportunities for cyber criminals and roadblocks for security teams, while in some cases putting personal data at greater risk. Read More

Thumbnail Image

Application security basics: A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent. Read More

Editor's Picks

1. 10 essential enterprise security tools (and 11 nice-to-haves)
2. 7 best practices for negotiating ransomware payments
3. Are long passphrases the answer to password problems?
4. Bruce Schneier's Click Here to Kill Everybody reveals the looming cybersecurity crisis
5. Cybercriminals are using blockchain to improve security. Should you?
6. 5 hard truths every CISO should know
7. What it takes to be a security consultant

Get Security Smart

From the editors of CSO, Security Smart is a quarterly security awareness newsletter ready for distribution in your organization. Subscribe now and arm your employees with the information they need to be more secure at home and at work. Learn more.
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive