Thursday, July 2, 2015

Is the information security industry having a midlife crisis?

Workarounds, kludges, and hacks that will improve your life.

FTC settles with developers of sneaky cryptocurrency mining app.

CSO Update
July 02, 2015

Is the information security industry having a midlife crisis?

The information security industry is hot right now, but it's hot because it's failing. READ MORE

Twitter
 

Issue highlights

1. Workarounds, kludges, and hacks that will improve your life

2. FTC settles with developers of sneaky cryptocurrency mining app

3. OPM hit by class-action suit over breach of federal employee data

4. Amazon releases open source cryptographic module

5. FBI alert discloses malware tied to the OPM and Anthem attacks

6. Apple releases tons of security updates for recent flaws and exploits

Webcast: IBM

Data Integration in Large Scale Data Environments

This webcast addresses data integration grid platforms and how they manage data integration tasks (data ingestion, movement, transformation, cleansing, updating, etc.) that are required for success with large data volumes. Join this session to learn about best practices and how to avoid common mistakes. Learn More

Workarounds, kludges, and hacks that will improve your life

Whether you want to lower your cell phone bill or find true love, there's usually a way around your problems. READ MORE

FTC settles with developers of sneaky cryptocurrency mining app

The developers of a mobile app called Prized that secretly mined cryptocurrencies on people's mobile phones have settled with the U.S. Federal Trade Commission after being accused of deceptive trade practices. READ MORE

Webcast: Zscaler

Where Your Next Cyber Security Threat Will Likely Come From

Join this compelling webcast that will address how to protect your employees against your next cyber security threat. This webcast will also tackle key causes for major security attacks: - Naive and disgruntled end-users - The disappearance of the corporate perimeter - Mobile devices becoming ideal entry points - Lack of layered defenses Learn more >>

OPM hit by class-action suit over breach of federal employee data

A federal employees union has filed a lawsuit against the U.S. Office of Personnel Management, its leadership and a contractor, alleging that their negligence led to a data breach that compromised the personal information of millions of current, former and prospective government employees and contractors. READ MORE

Amazon releases open source cryptographic module

The s2n module could serve as a leaner replacement for the OpenSSL TLS module. READ MORE

Webcast: CloudPassage

Containers and The Cloud: Overcoming Security Concerns

Driven largely by the adoption of cloud infrastructures and speedy development, innovation is outpacing security at a rate never before seen. Just as security teams are figuring out cloud, containers and micro service architectures are already antiquating traditional data center security models. View now

FBI alert discloses malware tied to the OPM and Anthem attacks

The breach at the Office of Personnel Management (OPM) is still the leading security incident in the news. Just last week the public learned that the breach might impact up to 32 million people and earlier this month, the FBI released a memo outlining the malware used in the attack, which has ties to the attack at Anthem. READ MORE

Apple releases tons of security updates for recent flaws and exploits

Along with Apple Music came fixes for a laundry list of exploits and a long-overdue change to Apple's digital certificate policy. READ MORE

White Paper: IBM

Plan, Predict and Execute Effective Retail Promotions

With more products, channels and competitors than ever before, the challenge for retailers to plan, predict and execute effective promotions only increases. However, identifying and delivering the best promotions is not as challenging as you think....when you have the right tools. Learn More

Top 5 Stories

  1. 9 creative ways to destroy sensitive data
  2. Pen testing tool or exploit? 6 samples of ways hackers
  3. Cybersecurity is the killer app for big data analytics
  4. FBI alert discloses malware tied to the OPM and Anthem attacks
  5. Incident response lessons from the Texas flash flood

Editor's Picks

  1. 15 hot, new security and privacy apps for Android and iOS
  2. How to get creative with your penetration testing
  3. 5 security bolstering strategies that won't break the bank
  4. What's wrong with this picture?The NEW clean desk test
  5. Inside an attack by the Syrian Electronic Army

Follow CSO Online

You are currently subscribed to cso_update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@cxo.com

Copyright (C) 2015 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@csoonline.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:19 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive