Tuesday, October 20, 2015

ICYMI: Near-flawless Social Engineering attack spoiled by single flaw

Drowning in security data? Here's how to make threat intel work for you.

Malware replaces browser with a dangerous Chrome lookalike.

CSO Update
October 20, 2015

ICYMI: Near-flawless Social Engineering attack spoiled by single flaw

A reader recently shared an email that was sent to their comptroller, which by all accounts was a near-perfect social engineering attempt. However, awareness training, combined with full executive support to question any suspect request, prevented what could've been a massive financial hit to the organization. READ MORE

Twitter
 

Issue highlights

1. INSIDER Drowning in security data? Here's how to make threat intel work for you

2. Malware replaces browser with a dangerous Chrome lookalike

3. Why we need behavior-centric detection and response

White Paper: ManagedMethods Inc

Shadow IT: Discover What's Hiding in you in Your Cloud

It's no secret that enterprise use of cloud apps is on the rise, causing intensified cloud security risks and the rise of Shadow IT. This white paper focuses on the importance of discovering all the cloud apps running in your company and how you can efficiently monitor and control their use. Learn More

INSIDER

Drowning in security data? Here's how to make threat intel work for you

Many companies think they know what the keys are to their kingdom and where the entry points are located. Unfortunately, they soon find out that the most serious breaches often take place somewhere else. READ MORE

Resource compliments of: Unisys

Unisys Security Solutions

Facing advanced security threats? Try a new approach to security. Reduce your attack surface with Unisys Security Solutions. Learn More

Malware replaces browser with a dangerous Chrome lookalike

This malicious browser looks and acts just like Chrome--except for all the pop-up ads, system file hijacking, and activity monitoring. READ MORE

Webcast: IBM

Data Movement at Maximum Speed

If you could move your data anywhere in the world, how would it transform your business? With Aspera, customers can transfer unlimited numbers of files of any size at high speed, predictably and reliably, at long distances, and with complete security. Learn More

Why we need behavior-centric detection and response

According to the Verizon 2015 Data Breach Investigations Report (DBIR), 60 percent of the time, attackers were able to compromise an organization within minutes. Meanwhile, in more than 75 percent of the cases, the average time to discover breaches was measured in days. These findings indicate a growing "detection deficit" between attackers and defenders. Verizon sees this as one of the primary challenges to the security industry today and going forward. This article discusses behavior-centric detection and response. READ MORE

White Paper: Citrix Systems

Modern Threats Against Web Properties

Customers, employees and partners are more frequently accessing web-delivered services from their mobile devices. At the same time, attackers are constantly discovering new ways to compromise security, including advanced malware and application layer attacks. Without the right tools, you are vulnerable. Learn more

Top 5 Stories

  1. Data dump suggests possible breach at Electronic Arts
  2. Road warriors are prime targets for hackers
  3. Who is responsible for security in the cloud?
  4. 8 penetration testing tools that will do the job
  5. Consumer Alert: Debit card fraud at Walmart discovered in 16 states

 

Editor's Picks

  1. 15 hot, new security and privacy apps for Android and iOS
  2. How to get creative with your penetration testing
  3. 5 security bolstering strategies that won't break the bank
  4. What's wrong with this picture?The NEW clean desk test
  5. Inside an attack by the Syrian Electronic Army

 

Follow CSO Online

You are currently subscribed to cso_update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@cxo.com

Copyright (C) 2015 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@csoonline.com. **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:03 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive