CSO Update | | During the overnight hours of Saturday night and Sunday morning May 23-24, heavy rain in the Texas Hill Country triggered a flash flood of near-Biblical proportions in Wimberley and San Marcos. This is the story of a disaster response program executed exceptionally well. READ MORE | | Issue highlights 1. 9 creative ways to destroy sensitive data 2. Hacked Opinions: Vulnerability disclosure Robert Hansen 3. Pen testing tool or exploit? 6 samples of ways hackers get in 4. Banking malware proves tough to repel 5. Scott McNealy on privacy: You still don't have any 6. INSIDER Who's winning the mobile payments war? | Resource compliments of: Akamai Ponemon Institute surveyed 594 IT professionals about 16 web application security topics, including their experiences with costs of web application attacks and the resources needed to manage them. Companies in this study reported an average of $1.5 million in costs related to DoS over the past 12 months. Read the Full Report. Click Here to Read the Free Ponemon Institute Research Report from Akamai | Feeling aggressive about getting rid of sensitive records? We've got the answer! Here are a few ways to ensure data security, including some that include a drill and a hammer; goggles optional. READ MORE | WhiteHat's Robert Hansen talks about disclosure, bounty programs, and vulnerability marketing with CSO, in the first of a series of topical discussions with industry leaders and experts. READ MORE | White Paper: ATTO Technology, Inc A transition is underway from standard data center infrastructures to cloud-enabled, software-defined ones that permit resources to be scaled in response to evolving business needs. Software Defined Storage (SDS) brings the benefits of virtualization to storage infrastructure by enabling a modular approach that abstracts software from hardware. Learn More | Attackers use the same tools in attacks that pen testers use to test. Six sample vulnerabilities and exploits. READ MORE | Dridex, Bebloh, TinyBanker and Dyre abound, according to SecurityScorecard. READ MORE | Webcast: IBM This webcast addresses data integration grid platforms and how they manage data integration tasks (data ingestion, movement, transformation, cleansing, updating, etc.) that are required for success with large data volumes. Join this session to learn about best practices and how to avoid common mistakes. Learn More | Big government is the biggest threat to privacy, the ex-Sun chief warns. READ MORE | It's still early, but Apple seems to be gaining momentum. Other players to watch: Google, PayPal, Walmart, Microsoft. READ MORE | White Paper: OpenText The utility industry is facing a number of challenges and trends related to enterprise asset information management. Learn how OpenText, SAP and Microsoft best practices help organizations like Anglian Water maximize utility asset management and performance. Learn More. | | | | | |
0 comments:
Post a Comment