Issue highlights 1. Is security really stuck in the Dark Ages? 2. CareFirst breach demonstrates how assumptions hurt healthcare 3. Is there really a correlation between effective risk management and profit margin growth? 4. Seven best practices for cloud security 5. The human cost of the Adult Friend Finder data breach 6. Do elected officials encrypt their email? 7. Attackers use email spam to infect point-of-sale terminals with new malware |
Resource compliments of: Akamai Attacks numbers for denial of service shot up in the first quarter, according to Akamai and targeted enterprises in multiple industries. DDoS attacks have become so common that they are now a stander part of enterprise risk assessments. Akamai publishes quarterly DDoS and Web Application attack metrics and trends for use in risk assessments and cybersecurity plans. The publicly available Q1 2015 State of the Internet Security Report can be accessed at no charge. |
RSA President Amit Yoran wasn't passing out compliments in his opening keynote at last month's convention. But he says the response from both colleagues and competitors is that he said what needed to be said: The industry needs to move beyond perimeter defense. READ MORE |
Last week, CareFirst BlueCross BlueShield (CareFirst) reported a data breach that was initially discovered last year. When the incident was first noticed, the company assumed they had taken care of the problem - only to learn that wasn't the case ten months later. READ MORE |
Resource compliments of: MacIT Conference Apple devices continue to permeate the enterprise. Deploying 10 or 10,000 devices can be daunting. Discover how you can manage this process for smooth, reliable, secure results. Learn more, visit www.macitconf.com. |
CSO explores the relationship between risks and profits and how enterprises can use information security risk management to increase profit margin growth. READ MORE |
Learn how to protect yourself in the cloud from the next vulnerability and/or wide scale attack. READ MORE |
Resource compliments of: Fortinet Cyber criminals take great pleasure in deceiving and evading your existing network security solutions. How can you keep up? It's time to integrate multiple types of security - that are applied from network core through to end user devices creating an Advanced Threat Protection Framework providing prevention, detection and mitigation. Raise the bar against cyber criminals with an Advanced Threat Protection Framework. |
READ MORE |
READ MORE |
Cybercriminals are targeting employees who browse the Web or check their email from point-of-sale (PoS) computers, a risky but unfortunately common practice. READ MORE |
White Paper: Unitrends This tongue-in-cheek white paper explores data loss from a contrarian point of view - exploring the top 7 shortcuts you can take to ensure that you lose your data. Read Now |
|
0 comments:
Post a Comment