CSO Update | | Even the most savvy IT professionals can fall victim to social engineering attacks. Here's how to recognize these threats and avoid falling prey to them. READ MORE | | Issue highlights 1. 8 areas where CSOs and CIOs will converge in 2015 2. IDG Contributor Network: After the Anthem breach: How we can help secure health data 3. Hamamatsu eliminates malware with virtual appliances 4. FAQ: How to find and remove Superfish from your Lenovo laptop 5. Android malware fakes phone shutdown to steal data | Resource compliments of: Return Path Download this report for a detailed analysis of malicious email campaigns addressing: 1) The rate at which email spoofing is increasing annually; 2) What is the best strategy for securing your data, brand, and assets?; and 3) If DMARC alone is enough to eliminate email phishing attacks. Download the report now | With enterprise innovations and a changing workforce, not to mention more sophisticated physical and cybersecurity threats, we're at a time now where CSOs and CIOs have no choice but to play nice in the sandbox. READ MORE | White Paper: LogMeIn This new study from Ovum and join.me by LogMeIn is based on a survey of over 3,900 full time professionals worldwide regarding their collaboration and meeting-related behaviors and activities. Learn More | The Anthem breach may have seemed a baffling or inexcusable security lapse. But once you understand what's going on in healthcare security and technology right now, you can see why this was inevitable and how we can help prevent such problems in the future. READ MORE | White Paper: LogMeIn The BYOA trend is accelerating, as more users are ditching their current solution and introducing their own collaboration apps into the workplace, often without consulting IT. Read this study to learn four ways IT pros can regain control of collaboration. Learn More | OpenDNS rescues optical sensor maker from crippling infections. READ MORE | Lenovo has shipped consumer PCs with software designed to offer a visual shopping experience, but in reality it's adware that breaks HTTPS online leaving customers vulnerable to attack and information theft. Here's how to determine if you're at risk, and if so, how to remove the Superfish software. READ MORE | The malware works in the background after pretending to shut down a phone, AVG said. READ MORE | : Citrix Systems Today's highly mobile employees and line-of-business groups are front-line participants in the struggle to secure the enterprise. This exclusive CSO Magazine eBook shares best practices for leading meaningful security discussions, engaging users to protect business information, and meeting security-related compliance requirements. Learn more | | | | | |
0 comments:
Post a Comment