Sunday, April 26, 2015

Insider threats force balance between security and access

Reporting cybercrime feels like 'Groundhog Day'.

Study: Firms not ready to respond to complex threats.

CSO Update
April 26, 2015

Insider threats force balance between security and access

Security experts caution that non-malicious actors within the enterprise are the more challenging aspect of the insider threat, calling for rethinking policies to better tailor employee and vendor access. READ MORE

 

Issue highlights

1. Reporting cybercrime feels like 'Groundhog Day'

2. Study: Firms not ready to respond to complex threats

3. Having 'the ear of the CEO' is key to battling cyberthreats

4. Key management is the biggest pain of encryption

5. Fox-IT releases answer to NSA's 'Quantum Insert' attack

6. IDG Contributor Network: Are we witnessing a cyber war between Russia and Ukraine? Don't blink - you might miss it

Resource compliments of: Intersect Alliance International

Seek to destroy security threats to SIEM

Every miscreant, hacker and disgruntled employee is gunning for your information. One of the easiest and most powerful ways to deal with malicious threats; rethink your SIEM. Beyond just collecting logs, you can now have real-¬time information and alerts, easy to use reporting and decision support for taking action. Download your guide

Reporting cybercrime feels like 'Groundhog Day'

Top-tier security journalists say if those in the industry want coverage, they can't pitch what everybody else is pitching. READ MORE

Study: Firms not ready to respond to complex threats

Only 46 percent of organizations have confidence that their security teams can respond to complex threats, according to a new study by ISACA. READ MORE

Resource compliments of: IT Roadmap Boston

IT Roadmap Boston Conference is all new for 2015

The content-rich agenda has been redesigned and reenergized to include increased IDG content from editors you know and trust and five focused pillars of technology learning that are the most critical for the year ahead. Register Now!

Having 'the ear of the CEO' is key to battling cyberthreats

Former FBI director stresses the importance of an enterprise-wide approach to cybersecurity, while Congress considers legislation to promote sharing threat information. READ MORE

Key management is the biggest pain of encryption

Most IT professionals rate the pain of managing encryption keys as severe, according to a new global survey by the Ponemon Institute. READ MORE

Webcast: Oracle

Insight into Governance, Risk & Compliance Programs

Join us on Wednesday, May 6 at 2:00 p.m. EST for a live discussion with industry experts. Learn More

Fox-IT releases answer to NSA's 'Quantum Insert' attack

A couple of years ago, among the trove of documents released by Edward Snowden, there was information about a "man-on-the-side" attack called Quantum Insert. READ MORE

IDG Contributor Network: Are we witnessing a cyber war between Russia and Ukraine? Don't blink - you might miss it

The term "cyber war" is often misused and misunderstood, but there is a clear and concise definition with a high bar of what constitutes one. The ongoing War in Ukraine, also known as the War in Donbass, meets the standard of cyber warfare, due to cyber attacks accompanying and tied to military actions and objectives. READ MORE

White Paper: Imperva

Web App Firewalls Are Worth the Investment for Enterprises

Firewalls don't provide sufficient protection for most public-facing websites or Web applications. Learn how Web App Firewalls help security leaders better protect data and apps in their organizations. View now

Top 5 Stories

  1. RSA Conference 2015: Criminals targeting gaps in user awareness training
  2. Hot security products at RSA 2015
  3. 7 security mistakes people make with their mobile device
  4. What's wrong with this picture? The NEW clean desk test
  5. The things end users do that drive security teams crazy

 

Editor's Picks

  1. 15 hot, new security and privacy apps for Android and iOS
  2. How to get creative with your penetration testing
  3. 5 security bolstering strategies that won't break the bank
  4. What's wrong with this picture?The NEW clean desk test
  5. Inside an attack by the Syrian Electronic Army

 

Follow CSO Online

You are currently subscribed to cso_update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@cxo.com

Copyright (C) 2015 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@csoonline.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:38 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive