CSO After Dark | | Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all READ MORE | | Issue highlights 1. How to fight back against reputation damaging Internet monsters 2. Security tools' effectiveness hampered by false positives 3. IDG Contributor Network: Prospective security employees see too many low-ball offers | White Paper: ManagedMethods Inc It's no secret that enterprise use of cloud apps is on the rise, causing intensified cloud security risks and the rise of Shadow IT. This white paper focuses on the importance of discovering all the cloud apps running in your company and how you can efficiently monitor and control their use. Learn More | In today's world people make up stuff to damage reputations for both individuals and companies, either because they are paid to or just because they are bad people. No matter the reasons, it can do an amazing amount of damage in this age of social media. Columnist Rob Enderle shares a resource to keep on hand, just in case. READ MORE | False positives are a problem not only because they take up manpower and time to address, but also because they can distract companies from dealing with legitimate security alerts. READ MORE | In this 3-part series, I'll deal with the issue of a shortage of people in the information security sector. While there are a number of reasons why firms struggle to find good information security talent, I feel there are two significant reasons exacerbating the problem, which I will detail in this piece, in addition to comments from two recruiters who have their fingers on the pulse on the industry. READ MORE | White Paper: Citrix Systems CyberEdge Group's 2nd annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. View now | | | | |
0 comments:
Post a Comment