Sunday, December 21, 2014

3 low-tech threats that lead to high-profile breaches

10 changes you can make to achieve security serenity now!. View it in your browser

Major Chinese smartphone manufacturer installed backdoor on up to 10 million devices. View it in your browser

CSO Update
December 21, 2014

3 low-tech threats that lead to high-profile breaches

It seems like almost daily that we find a new front-page article about a sophisticated data breach. But, more often than not, data breaches are initiated by low tech means. Here are three common low-tech attack vectors, and suggestions for how security teams can address them. READ MORE

 

Issue highlights

1. 10 changes you can make to achieve security serenity now!

2. Major Chinese smartphone manufacturer installed backdoor on up to 10 million devices

3. IDG Contributor Network: Going beyond gender for the agenda

4. Organized criminals targeting individual iPhone, Android users

White Paper: Citrix Systems

Security Leadership Series: Security Strategies for Success

Today's highly mobile employees and line-of-business groups are front-line participants in the struggle to secure the enterprise. This exclusive CSO Magazine eBook shares best practices for leading meaningful security discussions, engaging users to protect business information, and meeting security-related compliance requirements. Learn more

10 changes you can make to achieve security serenity now!

Some security changes are slow, expensive, and uncertain. Here are 10 of the best security changes that you can make with certainty, most of them with relative ease. READ MORE

Webcast: APC by Schneider Electric

Building Tomorrow's Data Center with Converged Technologies

A number of forces are converging: the cloud, converged infrastructure, big data and fabric architectures to name a few. And if those weren't enough, data center professionals must keep systems up 24 by 7, keep data secure, meet compliance obligations and keep costs and energy usage under control. It's a tall order. Learn More

Major Chinese smartphone manufacturer installed backdoor on up to 10 million devices

Coolpad, the world's sixth largest smartphone manufacturer, installed a back door that allows the company to install applications, send alerts, and monitor communications without user knowledge or approval READ MORE

White Paper: Brother International Corp.

A Secure, Easy to Deploy and Use Web Conferencing Solution

Web conferencing is now nearly ubiquitous. At the same time, new research shows that some concerns over the technology linger, particularly about security and ease of use and administration. Read this white paper to learn about technologies that can help address these challenges, both in the public and private cloud. Learn More

IDG Contributor Network: Going beyond gender for the agenda

We've all seen tech conference with only male speakers on the agenda. What would it be like to have a conference agenda populated only with women, but not a "women in tech" event? And what can this show us about increasing diversity in tech, not just for gender but for other under-representated groups as well? READ MORE

Organized criminals targeting individual iPhone, Android users

A well organized criminal group is targeting both iOS and Android users with highly targeted man-in-the-middle attacks, according to a new threat advisory from Akamai Technologies READ MORE

White Paper: Jive Software

Magic Quadrant for Social Software in the Workplace

With its in-depth guidance and independent third-party vendor evaluations, Gartner's Magic Quadrant market assessment can assist your organization in implementing an effective communication and collaboration solution. The full report covers 17 vendors, with specific information on their ability to execute and completeness of vision. Learn more.

Top 5 Stories

  1. Howard Stern is right: Journalists should do a gut check on Sony coverage
  2. Hackers hint at terror attacks, release more data from Sony Pictures
  3. 9 data breaches that cost someone their job
  4. 11 predictions for security in 2015
  5. This Linux grinch could put a hole in your security stocking

Editor's Picks

  1. 15 hot, new security and privacy apps for Android and iOS
  2. How to get creative with your penetration testing
  3. 5 security bolstering strategies that won't break the bank
  4. What's wrong with this picture?The NEW clean desk test
  5. Inside an attack by the Syrian Electronic Army

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

Follow CSO Online

You are currently subscribed to cso_update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@cxo.com

Copyright (C) 2014 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@csoonline.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive