Tuesday, January 27, 2015

5 things you can do to limit your exposure to insider threats

Deconstructing an IRS Phishing scam.

Facebook goes 'deep' in getting to know you.

CSO Update
January 27, 2015

5 things you can do to limit your exposure to insider threats

Despite the evolution of sophisticated attacks from outside hackers, insiders remain a primary threat and organizations need to take precautions to minimize the risk. READ MORE

 

Issue highlights

1. Deconstructing an IRS Phishing scam

2. Facebook goes 'deep' in getting to know you

3. Five myths (debunked) about security and privacy for Internet of Things

4. Java is the biggest vulnerability for US computers

5. Do executives think you are relevant to cloud security decisions?

Resource compliments of: Akamai Technologies, Inc.

Pre-Register Now! Get the latest DDoS news and trends!

Akamai's Prolexic Security and Engineering Research Team (PLXsert) is analyzing DDoS attacks from October to December. Among the news in the Q4 2014 State of the Internet - Security Report will be DDoS trends and details of a TCP Flag attack from a group claiming to be Lizard Squad, plus a new botnet profiling technique and spider mitigation tips. Pre-register now, you will receive a link to the free report as soon as it is released.

Deconstructing an IRS Phishing scam

Taxes. Avoiding them is illegal, and paying them is painful. Criminals know the type of stress the IRS can cause a taxpayer. They also know that most will immediately pay attention to something from the IRS. Perhaps not out of fear, but curiosity. After all, if you've paid your taxes on time like clockwork, why would the IRS be emailing you? READ MORE

: Venafi

Get Ready for PCI DSS v3 Deadlines

Are you prepared for PCI DSS v3? The standard demands that IT security leaders have more visibility and security over keys and certificates. Find out what you need to know about next-generation trust protection to lock down your mobile environment. Learn More

Facebook goes 'deep' in getting to know you

Facebook's artificial intelligence initiative known as "deep learning" is designed to protect user privacy, in some cases from themselves. But some privacy advocates say users should be aware that nothing they do on the site is private from Facebook itself READ MORE

White Paper: LogMeIn

Re-Evaluating the Role of "Traditional" Audio Conferencing

The audio conferencing market is changing and buyers are starting to move from traditional audio conference providers to integrated audio and web conferencing solutions. Learn More>>

Five myths (debunked) about security and privacy for Internet of Things

IoT has the potential to enable improvements to so many facets of life, the list is endless. Its primary advancement is enabling the interconnectedness of "things" and resulting insights and synergies. Yet that same connectedness raises concerns for security and privacy that must be addressed. READ MORE

Java is the biggest vulnerability for US computers

Oracle's Java poses the single biggest security risk to US desktops because of its penetration rate, number of vulnerabilities, and patch status, says a new report READ MORE

Do executives think you are relevant to cloud security decisions?

Findings from a recent report suggest the need to make some shifts to stay relevant in executive and board-level conversations about security READ MORE

White Paper: Box

A Mobile Security Checklist

Today's most productive employees are not tied to a desk. These top producers are experts at finding new ways to integrate mobile devices into their daily workflow. Your challenge is to build an IT strategy and architecture that can support this new way of working with easy, reliable, 24/7 access to information, from anywhere in the world. Learn more!

Top 5 Stories

  1. 20 of the worst passwords
  2. What's wrong with this picture? The NEW clean desk test
  3. Six ways Big Data could damage your business
  4. 7 security mistakes people make with their mobile device
  5. 6 products that will protect your privacy

Editor's Picks

  1. 15 hot, new security and privacy apps for Android and iOS
  2. How to get creative with your penetration testing
  3. 5 security bolstering strategies that won't break the bank
  4. What's wrong with this picture?The NEW clean desk test
  5. Inside an attack by the Syrian Electronic Army

Follow CSO Online

You are currently subscribed to cso_update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@cxo.com

Copyright (C) 2015 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@csoonline.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive