Tuesday, April 28, 2015

How the top social networks compare on privacy -- in one handy chart

Another day another Wordpress 0-day.

SendGrid customers told to reset passwords and DKIM keys after breach.

CSO Update
April 28, 2015

How the top social networks compare on privacy -- in one handy chart

Not all privacy settings are created equal. Here's an in-depth look at what Facebook, Twitter, LinkedIn and Google+ offer users. READ MORE

 

Issue highlights

1. Another day another Wordpress 0-day

2. SendGrid customers told to reset passwords and DKIM keys after breach

3. Zombie apps haunt BYOD workplaces

4. A post-RSA Conference recap

5. IDG Contributor Network: Identity as an attack surface

6. IDG Contributor Network: The hardware roots of trust

7. IT careers: Security talent is red-hot

8. 6 hard truths security pros must learn to live with

9. Boards are on high alert over security threats

Resource compliments of: Skyhigh Networks

[eBook] The Definitive Guide to Cloud Security

Based on Gartner's framework for managing cloud security, this eBook provides IT and Security teams with step-by-step checklists for managing the cloud security lifecycle. Whether you're just starting to define processes and policies, or reviewing an existing framework, this guide will get you started with best practices and useful action items. Download the guide for a breakdown of cloud security best practices, key requirements for enabling secure shadow IT usage, checklists for ensuring data security & compliance, criteria for evaluating CASB vendors, and more!

Another day another Wordpress 0-day

READ MORE

SendGrid customers told to reset passwords and DKIM keys after breach

SendGrid, a Boulder, Colorado-based transactional and marketing email delivery service, has urged customers to reset passwords after an internal investigation discovered that an employee's credentials were compromised. READ MORE

Zombie apps haunt BYOD workplaces

According to a new study of around 3 million apps on employee smartphones, 5.2 percent of iOS apps and 3.9 percent of Android apps are actually dead, removed from their respective app stores and no longer supported. READ MORE

 

A post-RSA Conference recap

Default credentials: Ignored by those who should be paying attention, and collected by everyone else, they're the reason most breaches don't need to be too technical. READ MORE

IDG Contributor Network: Identity as an attack surface

Mobile computing, cloud apps and tele-working have effectively made the de-perimeterization of IT security a "fait accompli". In the process, these redrawn battle lines have created new challenges for CSOs and new points of entry for attackers. Chief among these is user identities. This article examines the emerging concept of identity as an attack vector, what risks it poses to enterprises and what changes are needed to mitigate the threat. READ MORE

IDG Contributor Network: The hardware roots of trust

With recent revelations that some chip manufacturers are working with National Security Agency (NSA) to insert backdoors and cryptographic weaknesses into their products, what due diligence should be done to ensure hardware security? Is hardware still a better option than software encryption? READ MORE

Webcast: Rimini Street

Navigating Operating Costs and Roadmap Uncertainties for SAP

New innovation and updates in core ERP lag as SAP focuses all its attention on a long-term, high-risk "re-platform" strategy with its newly announced S/4HANA suite. Join us on May 14th at 1:00 p.m. EST for a live discussion and expert insight. Learn More

IT careers: Security talent is red-hot

Security pros are in high demand, and companies are willing to pay top dollar for the right candidates. Do you have what it takes to succeed on the infosec career track? READ MORE

6 hard truths security pros must learn to live with

Caveat emptor: Security solutions will always fall short in addressing the fundamental flaws of securing IT systems READ MORE

Boards are on high alert over security threats

Fear of cyberattacks has corporate directors on edge. CIOs must paint a realistic view of the company's security posture and steer the conversation toward managing business risk. READ MORE

White Paper: Imperva

Web App Firewalls Are Worth the Investment for Enterprises

Firewalls don't provide sufficient protection for most public-facing websites or Web applications. Learn how Web App Firewalls help security leaders better protect data and apps in their organizations. View now

Top 5 Stories

  1. Credit card terminals have used same password since 1990s, claim researchers
  2. 7 security mistakes people make with their mobile device
  3. RSA Conference 2015: Criminals targeting gaps in user awareness training
  4. What's wrong with this picture? The NEW clean desk test
  5. Hot security products at RSA 2015

 

Editor's Picks

  1. 15 hot, new security and privacy apps for Android and iOS
  2. How to get creative with your penetration testing
  3. 5 security bolstering strategies that won't break the bank
  4. What's wrong with this picture?The NEW clean desk test
  5. Inside an attack by the Syrian Electronic Army

 

Follow CSO Online

You are currently subscribed to cso_update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@cxo.com

Copyright (C) 2015 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@csoonline.com. **


ads

Ditulis Oleh : Angelisa Vivian Hari: 6:46 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive