Thursday, October 29, 2015

6 tips for your security awareness training

Meet the man-in-the-middle of your next security crisis.

Sony BMG Rootkit Scandal: 10 Years Later.

CSO Update
October 29, 2015

6 tips for your security awareness training

Employees must keep a sharp lookout every day for security breaches. READ MORE

Twitter
 

Issue highlights

1. Meet the man-in-the-middle of your next security crisis

2. Sony BMG Rootkit Scandal: 10 Years Later

3. Hacked Opinions: The legalities of hacking – Ryan Gillis

Resource compliments of: Akamai

New case study of attacks analysis

Utilizing new social tactics and DDoS methodology, the activities of extortionist group DD4BC increased dramatically and targeted larger organizations over one calendar year. Over 140 DDoS attacks attacks confirmed as DD4BC were observed by Akamai with the financial services sector amongst the most often targeted. Akamai's newly released Case Study: Summary of Operation DD4BC provides attack analysis, examples of extortion letters and security suggestion organizations can take to avoid becoming a target can be downloaded at:http://bit.ly/1gre3KY

Meet the man-in-the-middle of your next security crisis

If he's the man-in-the-middle, why are you stuck between a rock and a hard place? READ MORE

Resource compliments of: Unisys

Unisys Security Solutions

Facing advanced security threats? Try a new approach to security. Reduce your attack surface with Unisys Security Solutions. Learn More

Sony BMG Rootkit Scandal: 10 Years Later

Hackers really have had their way with Sony over the past year, taking down its Playstation Network last Christmas Day and creating an international incident by exposing confidential data from Sony Pictures Entertainment in response to The Interview comedy about a planned assassination on North Korea's leader. Some say all this is karmic payback for what's become known as a seminal moment in malware history: Sony BMG sneaking rootkits into music CDs 10 years ago the name of digital rights management. READ MORE

White Paper: Open Text

Transactional Data: Are You Ready for Customer Demands?

An IDG Research survey reveals that customers want access to their transactional data from any device, any time. Letting customers access and interact with their transactional data from any device is complex. Here are some insights for IT leaders who are ready to create a strategy. Learn More

Hacked Opinions: The legalities of hacking – Ryan Gillis

Palo Alto Networks' Ryan Gillis talks about hacking regulation and legislation with CSO in a series of topical discussions with industry leaders and experts. READ MORE

White Paper: Citrix Systems

Achieve Compliance and Increase Web Application Security

Beginning in January of 2015, all entities that store, process, or transmit cardholder data will be subject to version 3.0 of the Payment Card Industry Data Security Standard (PCI DSS). This white paper examines the prevailing conditions driving evolution of the PCI DSS and the resulting challenges facing today's IT departments. View now

Top 5 Stories

  1. From start to finish, inside a PayPal Phishing scam
  2. How long does it take for employees to be security conscious
  3. DDoS scammers collect $20,000 with Ashley Madison extortion
  4. 8 penetration testing tools that will do the job
  5. The FBI isn't wrong; sometimes you will have to pay the ransom

Editor's Picks

  1. 15 hot, new security and privacy apps for Android and iOS
  2. How to get creative with your penetration testing
  3. 5 security bolstering strategies that won't break the bank
  4. What's wrong with this picture?The NEW clean desk test
  5. Inside an attack by the Syrian Electronic Army

Follow CSO Online

You are currently subscribed to cso_update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@cxo.com

Copyright (C) 2015 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@csoonline.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:05 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive