Tuesday, June 30, 2015

Incident response lessons from the Texas flash flood

9 creative ways to destroy sensitive data.

Hacked Opinions: Vulnerability disclosure – Robert Hansen.

CSO Update
June 30, 2015

Incident response lessons from the Texas flash flood

During the overnight hours of Saturday night and Sunday morning May 23-24, heavy rain in the Texas Hill Country triggered a flash flood of near-Biblical proportions in Wimberley and San Marcos. This is the story of a disaster response program executed exceptionally well. READ MORE

Twitter
 

Issue highlights

1. 9 creative ways to destroy sensitive data

2. Hacked Opinions: Vulnerability disclosure – Robert Hansen

3. Pen testing tool or exploit? 6 samples of ways hackers get in

4. Banking malware proves tough to repel

5. Scott McNealy on privacy: You still don't have any

6. INSIDER Who's winning the mobile payments war?

Resource compliments of: Akamai

Cost of Web Application Attacks

Ponemon Institute surveyed 594 IT professionals about 16 web application security topics, including their experiences with costs of web application attacks and the resources needed to manage them. Companies in this study reported an average of $1.5 million in costs related to DoS over the past 12 months. Read the Full Report. Click Here to Read the Free Ponemon Institute Research Report from Akamai

9 creative ways to destroy sensitive data

Feeling aggressive about getting rid of sensitive records? We've got the answer! Here are a few ways to ensure data security, including some that include a drill and a hammer; goggles optional. READ MORE

Hacked Opinions: Vulnerability disclosure – Robert Hansen

WhiteHat's Robert Hansen talks about disclosure, bounty programs, and vulnerability marketing with CSO, in the first of a series of topical discussions with industry leaders and experts. READ MORE

White Paper: ATTO Technology, Inc

Cut Costs & Boost Performance with Software Defined Storage

A transition is underway from standard data center infrastructures to cloud-enabled, software-defined ones that permit resources to be scaled in response to evolving business needs. Software Defined Storage (SDS) brings the benefits of virtualization to storage infrastructure by enabling a modular approach that abstracts software from hardware. Learn More

Pen testing tool or exploit? 6 samples of ways hackers get in

Attackers use the same tools in attacks that pen testers use to test. Six sample vulnerabilities and exploits. READ MORE

Banking malware proves tough to repel

Dridex, Bebloh, TinyBanker and Dyre abound, according to SecurityScorecard. READ MORE

Webcast: IBM

Data Integration in Large Scale Data Environments

This webcast addresses data integration grid platforms and how they manage data integration tasks (data ingestion, movement, transformation, cleansing, updating, etc.) that are required for success with large data volumes. Join this session to learn about best practices and how to avoid common mistakes. Learn More

Scott McNealy on privacy: You still don't have any

Big government is the biggest threat to privacy, the ex-Sun chief warns. READ MORE

INSIDER

Who's winning the mobile payments war?

It's still early, but Apple seems to be gaining momentum. Other players to watch: Google, PayPal, Walmart, Microsoft. READ MORE

White Paper: OpenText

Improve Operational Excellence

The utility industry is facing a number of challenges and trends related to enterprise asset information management. Learn how OpenText, SAP and Microsoft best practices help organizations like Anglian Water maximize utility asset management and performance. Learn More.

Top 5 Stories

  1. Security Short Take: Samsung bows to pressure on Windows update tweaks
  2. Common cybersecurity myths debunked
  3. Trojan that hides inside images infects healthcare organizations
  4. IT: Forget the device, secure the data
  5. No, Virginia, the FBI was not hacked by China. Newsweek got it wrong

Editor's Picks

  1. 15 hot, new security and privacy apps for Android and iOS
  2. How to get creative with your penetration testing
  3. 5 security bolstering strategies that won't break the bank
  4. What's wrong with this picture?The NEW clean desk test
  5. Inside an attack by the Syrian Electronic Army

Follow CSO Online

You are currently subscribed to cso_update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@cxo.com

Copyright (C) 2015 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@csoonline.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:27 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive