Issue highlights 1. HP: 100% of smartwatches have security flaws 2. What can we learn from JPMorgan's insider breaches? 3. The Irari Report: Threat Intelligence and the Dark Web 4. Google Drive phishing is back -- with obfuscation 5. Hacked Opinions: Vulnerability disclosure Sam Curry 6. Predicting winners and losers in the EMV rollout |
Resource compliments of: Skyhigh Networks Based on Gartner's framework for managing cloud security, this eBook provides IT and Security teams with step-by-step checklists for managing the cloud security lifecycle. Whether you're just starting to define processes and policies, or reviewing an existing framework, this guide will get you started with best practices and useful action items. Download the Guide! |
In a recent security assessment of ten smartwatches and their iOS and Android companion applications, every single watch had at least one significant security flaw, according to a new report from HP Fortify READ MORE |
Another former JPMorgan Chase & Co. (JPMC) employee was recently arrested by the FBI on charges of stealing customer data and trying to sell it. Similar incidents have occurred multiple times at JPMC over the past few years. Upon closer inspection a common thread emerges from each of these incidents -- JPMC's inability to account for insider threats. READ MORE |
White Paper: CrowdStrike Download this white paper to understand how successful attacks targeting high-profile government and corporate entities are able to easily bypass traditional defenses. Find out how some organizations are now able to detect and respond to malware-free intrusions using next generation endpoint protection technology. View more |
Video READ MORE |
If you have a Google account and a stranger sends you a link to a document on Google Drive, think twice before clicking -- it could be a phishing scam designed to harvest your Google credentials READ MORE |
White Paper: CrowdStrike Download this checklist and learn how to avoid common mistakes and eliminate deficiencies within your existing security measures, providing practical steps for enhancing your effectiveness against the stealthiest adversaries and attacks. Learn more |
Arbor Networks' Sam Curry talks about disclosure, bounty programs, and vulnerability marketing with CSO, in the first of a series of topical discussions with industry leaders and experts. READ MORE |
On October 1, the liability for credit card fraud shifts from card issuers to retailers that haven't transitioned to accept cards that use new EMV technology. Some groups will be more ready than others. READ MORE |
White Paper: Citrix | HP Customers expect to get what they want in their mobile moment. They expect to access any information or services from any device, in their immediate context, at their moment of need. As a result, mobility has become central to the delivery of a high-quality customer experience and often, by extension, the employee experience. Learn More |
|
0 comments:
Post a Comment