Tuesday, March 31, 2015

Slideshow: How end users drive security teams crazy

The CSO Security Career Survival Guide.

5 keys to hiring security talent.

CSO Update
March 31, 2015

Slideshow: How end users drive security teams crazy

To protect users from public embarrassment their identities have been withheld in these true stories of failures to follow security protocol. READ MORE

 

Issue highlights

1. The CSO Security Career Survival Guide

2. 5 keys to hiring security talent

3. IDG Contributor Network: Cyber what? (part 2 of 2)

4. Big data collection makes it hard for you to remain anonymous

Resource compliments of: Akamai

New Analyst White Paper: The Cost of Denial

Ponemon Institute surveyed over 600 individuals involved in preventing, detecting and containing denial-of-service attacks against organizations. Brining together responses and analysis, Ponemon Institute identified key stats and trends in cybersecurity that enterprise organizations should be aware of. Read the full white paper Ponemon Institute: The Cost of Denial-of-Service Attacks and discover important facts including the cost of a DDoS attack and effective technologies for protection and mitigation.

The CSO Security Career Survival Guide

CSO's Security Career Survival Guide READ MORE

Resource compliments of: DEMO Traction

Get hyper-focused on hyper-growth tech

Attend DEMO Traction 2015 to see 40 fast-growing startups. See live demos of cutting-edge products for sales, marketing, engineering, IT, operations, logistics, finance and HR. Nonstop tech exploration for innovators, entrepreneurs, IT pros and business leaders. One-day event. Limited-time savings. Register now.

5 keys to hiring security talent

Recruiting IT security professionals can be tough, unless you have a great elevator pitch. The CSO of an insurance company provides advice on telling job candidates a compelling story. READ MORE

White Paper: Fortinet

How to Secure Email Gateway and Sandbox

Secure Email Gateways and sandbox tools are a powerful combination, and indeed perfect partners, in combating in Advanced Persistent Threats (APTs). This solution brief explains the 3 reasons why these tools are the right team to combat APTs. View Now>>

IDG Contributor Network: Cyber what? (part 2 of 2)

Words beginning with "cyber," such as "cyber war" and "cyberspace" are entering our everyday lexicon. Politicians use the terms to describe an ambiguous threat from another country and security vendors use the terms to get you to buy their services. What exactly is cyberspace? Is cyber warfare and cyber terrorism real, and if so, are there real-world examples? These questions, and more, are tackled in this two-part series. READ MORE

Big data collection makes it hard for you to remain anonymous

One of the challenges of Big Data collection is maintaining personal privacy. One way to do that is with 'de-identification' - eliminating personally identifiable information. It can be done effectively if those doing the collection use rigorous methods. But experts say that is a very big 'if'. READ MORE

White Paper: Fortinet

An Advanced Threat Protection Framework

In 2015 we expect to see cyber criminals, fueled by the success of many high profile hacks, continue to innovate with an even greater focus on deceiving and evading existing security solutions. View Now>>

Top 5 Stories

  1. Indiana's website taken out by DDoS in response to 'religious freedom' law
  2. The things end users do that drive security teams crazy
  3. 9 security gadgets for mobile devices
  4. 7 security mistakes people make with their mobile device
  5. Millions of records compromised in these data breaches

 

Editor's Picks

  1. 15 hot, new security and privacy apps for Android and iOS
  2. How to get creative with your penetration testing
  3. 5 security bolstering strategies that won't break the bank
  4. What's wrong with this picture?The NEW clean desk test
  5. Inside an attack by the Syrian Electronic Army

 

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

Follow CSO Online

You are currently subscribed to cso_update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@cxo.com

Copyright (C) 2015 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@csoonline.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:35 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive