CSO Update | | As the cost and likelihood of security breaches increases, CIOs need to boost security measures -- and spending -- to mitigate the risk to your business. READ MORE | | Issue highlights 1. Three ways a CSO can stop being the bad guy 2. Pizza restaurant targeted for supporting Indiana's 'religious freedom' law 3. Should you be afraid of text messages? 4. Over 100,000 devices can be used to amplify DDoS attacks via multicast DNS 5. Obama approves sanctions against hackers with new executive order 6. New malware program used in attacks against energy sector companies | Resource compliments of: Gartner Security & Risk Management Summit Gartner Security & Risk Management Summit, June 8 11, in National Harbor, MD, shows you how to stay ahead of increasing threats, align security/risk strategies with enterprise objectives, assure compliance with new regulatory, compliance, privacy, and e-discovery requirements, and more. You can also earn CPE towards ISACA, (ISC)2 and DRII. Record turnout expected! Register today and save $200 on the standard registration rate when you use priority code SECPA1. | Some security executives are redefining their roles to become people who say "yes," and restructuring their departments around becoming enablers of business, instead of always being the folks who say "no" READ MORE | They were the first restaurant owners in Indiana to come out in support of Indiana's controversial "religious freedom" bill, signed into law last week by Governor Mike Pence. However, the O'Connor family and their business, Memories Pizza, quickly came under attack online. READ MORE | Resource compliments of: Fortinet This introductory white paper outlines basic considerations for securing Data Center Networks. As the modern Data Center evolves to embrace Virtualization, Cloud and BYOD, organizations must protect against new threat vectors and advanced attacks while also keeping up with increasing bandwidth and Next-Generation Network architectures. Learn more now: | Are you worried about hackers stealing millions of your customer records? According to one security vendor, you should be more worried about your employees spilling corporate secrets via text message, 160 characters at a time READ MORE | Over 100,000 devices have a misconfigured service called multicast DNS that accepts requests from the Internet and can potentially be abused to amplify distributed denial-of-service (DDoS) attacks. READ MORE | White Paper: ServiceNow This paper provides IT leaders with insight into three IT imperatives that 24 CIOs and senior IT executives used to reposition IT and transform the enterprise. Read Now | President Obama has signed an executive order that authorizes the U.S. government to impose sanctions against those responsible acts of cyber crime, as well as those who helped support it. READ MORE | The Trojan program is used for reconnaissance and distribution of additional malware, researchers from Symantec say READ MORE | White Paper: ServiceNow Modern IT requires an evolved approach to orchestration that erases the barriers separating people, process and technology. Learn how ServiceNow Orchestration empowers IT organizations to do all of this and more. Learn more | | | | | |
0 comments:
Post a Comment