Tuesday, September 22, 2015

12 companies that the FTC has gone after for lax security

FTC's actions put CSOs on high alert.

Submit questions for John McAfee.

CSO Update
September 22, 2015

12 companies that the FTC has gone after for lax security

The FTC targets companies that they say have not lived up to their security promises. READ MORE

Twitter
 

Issue highlights

1. FTC's actions put CSOs on high alert

2. Submit questions for John McAfee

3. 5 ways to shore up security in your BYOD strategy

4. How to respond to Chinese cyber attacks: Call them?

Resource compliments of: Absolute Software

Adaptive Endpoint Security & Data Risk Management

Absolute DDS is an adaptive endpoint security solution. It provides you with a persistent connection to all of your endpoints and the data they contain. This means you're always in control, even if a device is off the network or in the hands of an unauthorized user. Secure endpoints, assess risk, and respond appropriately to security incidents. Watch the demo to find out how Persistence technology and adaptive endpoint security can allow your organization to stay in control of your devices and the data they contain

FTC's actions put CSOs on high alert

Four takeaways from the FTC's power to sue for lax security. READ MORE

Resource compliments of: Websense, Inc.

You can survive a data breach, but not a data loss.

In 2014, data breaches cost $400 million, not including the negative brand reputation impact when sensitive data leaks. While threats grow, protecting your data – the real target of most breaches – becomes the priority. Data Theft Prevention involves a holistic approach to securing data everywhere – in the cloud, on premise and on remote devices. Raytheon|Websense's Data Theft Prevention paper outlines the need for protection, how to take a holistic approach, and how security protocols don't have to squelch technological innovation for users. Read the paper now.

Submit questions for John McAfee

Want to get a question answered by a Presidential candidate and security celebrity, then send our authors your inquiry before Sept. 29. READ MORE

Webcast: CDW

How to Find Hidden Malware Lurking in Your Systems

No business is immune to a cyber-attack or data breach. Indeed, malware lives on most corporate networks, meaning smart companies don't just practice threat prevention - they engage in active detection. Learn More

5 ways to shore up security in your BYOD strategy

Despite years in the making, many security leaders are still wary about BYOD policy. Here are five ways to combine security and privacy with the ever-increasing demand for user-owned devices in the enterprise. READ MORE

How to respond to Chinese cyber attacks: Call them?

Ira Winkler and Araceli Treu Gomes interview Lt. Col Bill Hagestad, author of Chinese Cyber Crime, about how companies should respond if they believe they are being hacked by China. READ MORE

White Paper: Citrix Systems

Modern Threats Against Web Properties

Customers, employees and partners are more frequently accessing web-delivered services from their mobile devices. At the same time, attackers are constantly discovering new ways to compromise security, including advanced malware and application layer attacks. Without the right tools, you are vulnerable. Learn more

Top 5 Stories

  1. 8 ways to fend off spyware, malware and ransomware
  2. Russian military attacked, possibly by Chinese
  3. Call recording on: Listen as an IRS scammer threatens us
  4. Study names the five most hackable vehicles
  5. China makes hackers an offer they can't refuse

 

Editor's Picks

  1. 15 hot, new security and privacy apps for Android and iOS
  2. How to get creative with your penetration testing
  3. 5 security bolstering strategies that won't break the bank
  4. What's wrong with this picture?The NEW clean desk test
  5. Inside an attack by the Syrian Electronic Army

 

Follow CSO Online

You are currently subscribed to cso_update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@cxo.com

Copyright (C) 2015 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@csoonline.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:05 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive