Wednesday, April 1, 2015

9 biggest information security threats for the next two years

Ransomware: Pay it or fight it? | British Airways Frequent Flyer Program Grounded
CSO Security Leader - Extra Mailing

From the editors of:

CSO
CSO Continuity and Recovery

April 01, 2015

  F T L

Share with Your Network

9 biggest information security threats for the next two years

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security threats over a two-year period. Here are the top 9 threats to watch for through 2017. Read More


Resource compliments of: Gartner Security & Risk Management Summit

Earn CPE credits at security-focused Gartner conference

Gartner Security & Risk Management Summit, June 8 – 11, in National Harbor, MD, shows you how to stay ahead of increasing threats, align security/risk strategies with enterprise objectives, assure compliance with new regulatory, compliance, privacy, and e-discovery requirements, and more. You can also earn CPE towards ISACA, (ISC)2 and DRII. Record turnout expected! Register today and save $200 on the standard registration rate when you use priority code SECPA1.


In this Issue


White Paper: SnapLogic

The Death of Traditional Data Integration

This whitepaper outlines the changes occurring in big data and the emerging patterns for big data integration. Learn more.


Ransomware: Pay it or fight it?

Experts recommend fighting back against CryptoWall and other ransomware, but for many the $500 ransom is a small price to pay. Read More

British Airways Frequent Flyer Program Grounded

Members of the British Airways loyalty program have been the victims of a data breach with some users accounts frozen until British Airways concludes their investigations Read More

Indiana's website taken out by DDoS in response to 'religious freedom' law

The state of Indiana is having a bad week. First, Governor Mike Pence signed a controversial "religious freedom" bill into law; now, twenty-four hours later, the state's website was knocked offline by a group taking up another person's protest against Religious Freedom Restoration Act. Read More

Survey: 75% of firms would take hours or longer to spot breach

Although 68 percent of companies said they are prepared for a breach, 75 percent estimated it would take hours, days, or weeks for them to notice that one had occurred Read More

Editor's Picks

  1. 15 hot, new security and privacy apps for Android and iOS
  2. How to get creative with your penetration testing
  3. 5 security bolstering strategies that won't break the bank
  4. What's wrong with this picture?The NEW clean desk test
  5. Inside an attack by the Syrian Electronic Army

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

Get more CSO peer perspective online:

F Facebook
T Twitter
L LinkedIn

You are currently subscribed to cso_continuity_recovery as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact CSO Online, please send an e-mail to online@cxo.com

Copyright (C) 2015 CSO Online, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@cxo.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:30 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive