Tuesday, May 26, 2015

Slideshow: 11 breaches that leaked over 1 million records each

Is security really stuck in the Dark Ages?.

CareFirst breach demonstrates how assumptions hurt healthcare.

CSO Update
May 26, 2015

Slideshow: 11 breaches that leaked over 1 million records each

We used 1 million records exposed as our floor in creating this list. Starting with a number that big says a lot about the state of data security. READ MORE

 

Issue highlights

1. Is security really stuck in the Dark Ages?

2. CareFirst breach demonstrates how assumptions hurt healthcare

3. Is there really a correlation between effective risk management and profit margin growth?

4. Seven best practices for cloud security

5. The human cost of the Adult Friend Finder data breach

6. Do elected officials encrypt their email?

7. Attackers use email spam to infect point-of-sale terminals with new malware

Resource compliments of: Akamai

DDoS Attack Activity Soars Says Akamai in Security Report

Attacks numbers for denial of service shot up in the first quarter, according to Akamai and targeted enterprises in multiple industries. DDoS attacks have become so common that they are now a stander part of enterprise risk assessments. Akamai publishes quarterly DDoS and Web Application attack metrics and trends for use in risk assessments and cybersecurity plans. The publicly available Q1 2015 State of the Internet – Security Report can be accessed at no charge.

Is security really stuck in the Dark Ages?

RSA President Amit Yoran wasn't passing out compliments in his opening keynote at last month's convention. But he says the response from both colleagues and competitors is that he said what needed to be said: The industry needs to move beyond perimeter defense. READ MORE

CareFirst breach demonstrates how assumptions hurt healthcare

Last week, CareFirst BlueCross BlueShield (CareFirst) reported a data breach that was initially discovered last year. When the incident was first noticed, the company assumed they had taken care of the problem - only to learn that wasn't the case ten months later. READ MORE

Resource compliments of: MacIT Conference

Manage Deployment of iOS Effectively in the Enterprise

Apple devices continue to permeate the enterprise. Deploying 10 or 10,000 devices can be daunting. Discover how you can manage this process for smooth, reliable, secure results. Learn more, visit www.macitconf.com.

Is there really a correlation between effective risk management and profit margin growth?

CSO explores the relationship between risks and profits and how enterprises can use information security risk management to increase profit margin growth. READ MORE

Seven best practices for cloud security

Learn how to protect yourself in the cloud from the next vulnerability and/or wide scale attack. READ MORE

Resource compliments of: Fortinet

Advanced Cyber Threats Require Advanced Threat Protection

Cyber criminals take great pleasure in deceiving and evading your existing network security solutions. How can you keep up? It's time to integrate multiple types of security - that are applied from network core through to end user devices – creating an Advanced Threat Protection Framework providing prevention, detection and mitigation. Raise the bar against cyber criminals with an Advanced Threat Protection Framework.

The human cost of the Adult Friend Finder data breach

READ MORE

Do elected officials encrypt their email?

READ MORE

Attackers use email spam to infect point-of-sale terminals with new malware

Cybercriminals are targeting employees who browse the Web or check their email from point-of-sale (PoS) computers, a risky but unfortunately common practice. READ MORE

White Paper: Unitrends

7 Shortcuts to Losing Your Data (and Probably Your Job!)

This tongue-in-cheek white paper explores data loss from a contrarian point of view - exploring the top 7 shortcuts you can take to ensure that you lose your data. Read Now

Top 5 Stories

  1. 13 must-have security tools
  2. Hard-coded credentials placing dental offices at risk
  3. DDoS reflection attacks are back – and this time, it's personal
  4. What every CSO should be doing now about the Starbucks potential hack
  5. Many ransomware victims plead with attacker

 

Editor's Picks

  1. 15 hot, new security and privacy apps for Android and iOS
  2. How to get creative with your penetration testing
  3. 5 security bolstering strategies that won't break the bank
  4. What's wrong with this picture?The NEW clean desk test
  5. Inside an attack by the Syrian Electronic Army

 

Follow CSO Online

You are currently subscribed to cso_update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@cxo.com

Copyright (C) 2015 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@csoonline.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:19 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive