Thursday, April 2, 2015

Why you should be spending more on security

Three ways a CSO can stop being the bad guy.

Pizza restaurant targeted for supporting Indiana's 'religious freedom' law.

CSO Update
April 02, 2015

Why you should be spending more on security

As the cost and likelihood of security breaches increases, CIOs need to boost security measures -- and spending -- to mitigate the risk to your business. READ MORE

 

Issue highlights

1. Three ways a CSO can stop being the bad guy

2. Pizza restaurant targeted for supporting Indiana's 'religious freedom' law

3. Should you be afraid of text messages?

4. Over 100,000 devices can be used to amplify DDoS attacks via multicast DNS

5. Obama approves sanctions against hackers with new executive order

6. New malware program used in attacks against energy sector companies

Resource compliments of: Gartner Security & Risk Management Summit

Earn CPE credits at security-focused Gartner conference

Gartner Security & Risk Management Summit, June 8 – 11, in National Harbor, MD, shows you how to stay ahead of increasing threats, align security/risk strategies with enterprise objectives, assure compliance with new regulatory, compliance, privacy, and e-discovery requirements, and more. You can also earn CPE towards ISACA, (ISC)2 and DRII. Record turnout expected! Register today and save $200 on the standard registration rate when you use priority code SECPA1.

Three ways a CSO can stop being the bad guy

Some security executives are redefining their roles to become people who say "yes," and restructuring their departments around becoming enablers of business, instead of always being the folks who say "no" READ MORE

Pizza restaurant targeted for supporting Indiana's 'religious freedom' law

They were the first restaurant owners in Indiana to come out in support of Indiana's controversial "religious freedom" bill, signed into law last week by Governor Mike Pence. However, the O'Connor family and their business, Memories Pizza, quickly came under attack online. READ MORE

Resource compliments of: Fortinet

Data Center Security: Speed, Capacity and Ultra-low Latency

This introductory white paper outlines basic considerations for securing Data Center Networks. As the modern Data Center evolves to embrace Virtualization, Cloud and BYOD, organizations must protect against new threat vectors and advanced attacks while also keeping up with increasing bandwidth and Next-Generation Network architectures. Learn more now:

Should you be afraid of text messages?

Are you worried about hackers stealing millions of your customer records? According to one security vendor, you should be more worried about your employees spilling corporate secrets via text message, 160 characters at a time READ MORE

Over 100,000 devices can be used to amplify DDoS attacks via multicast DNS

Over 100,000 devices have a misconfigured service called multicast DNS that accepts requests from the Internet and can potentially be abused to amplify distributed denial-of-service (DDoS) attacks. READ MORE

White Paper: ServiceNow

Transform IT: Transform the Enterprise

This paper provides IT leaders with insight into three IT imperatives that 24 CIOs and senior IT executives used to reposition IT and transform the enterprise. Read Now

Obama approves sanctions against hackers with new executive order

President Obama has signed an executive order that authorizes the U.S. government to impose sanctions against those responsible acts of cyber crime, as well as those who helped support it. READ MORE

New malware program used in attacks against energy sector companies

The Trojan program is used for reconnaissance and distribution of additional malware, researchers from Symantec say READ MORE

White Paper: ServiceNow

Orchestration For Modern IT: Helping IT Accelerate Business

Modern IT requires an evolved approach to orchestration that erases the barriers separating people, process and technology. Learn how ServiceNow Orchestration empowers IT organizations to do all of this and more. Learn more

Top 5 Stories

  1. The things end users do that drive security teams crazy
  2. 9 biggest information security threats for the next two years
  3. What's wrong with this picture? The NEW clean desk test
  4. 7 security mistakes people make with their mobile device
  5. 9 security gadgets for mobile devices

Editor's Picks

  1. 15 hot, new security and privacy apps for Android and iOS
  2. How to get creative with your penetration testing
  3. 5 security bolstering strategies that won't break the bank
  4. What's wrong with this picture?The NEW clean desk test
  5. Inside an attack by the Syrian Electronic Army

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

Follow CSO Online

You are currently subscribed to cso_update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@cxo.com

Copyright (C) 2015 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@csoonline.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:22 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive