Issue highlights 1. Scammers switch from Ashley Madison extortion to death threats 2. INSIDER 4 Interview questions for data security analysts 3. Groundhog Day Security 4. Oracle's Larry Ellison decries poor state of security, says he's fixed it |
Resource compliments of: Ixia Ixia's ThreatARMOR represents another innovation and an extension for a company's Visibility Architecture, reducing the ever-increasing size of their global network attack surface. Contact us today to schedule a demo and find out more! |
Last week, Salted Hash reported on the extortion attempts by a group of scammers targeting the leaked Ashley Madison email list. Since that report, the extortion attempts have continued, but on Friday, the latest emails shifted from promises of leaked information to death threats. READ MORE |
Resource compliments of: House ads Join Maryfran Johnson, Editor-in-Chief, CIO magazine at CIO Perspectives Houston on November 12 ofr a special discussion on how IT leaders need to transform their departments from an inward-focused mindset toward a more consultative, customer-focused role. Learn more and register at http://www.cioperspectives.com/HOU15/NL |
Data security analysts are a hot commodity with a rising salary. Here are four interview questions you can expect hiring managers to ask, plus tips to answer them. READ MORE |
White Paper: Kaspersky In today's complex cyberthreat landscape, it's more important than ever to have the right security solution in place. Are you settling for partial protection? Learn More |
READ MORE |
Oracle Chairman Larry Ellison has put better security at the heart of his pitch for the company's new products, though it could be a tough sell for a man who's long claimed his products are "unbreakable." READ MORE |
White Paper: Sophos Inc Today's web attacks are extremely sophisticated and multi-faceted, motivated by a massive underground economy that trades in compromised computers and user information. This paper shows you how modern web attacks work, broken down into five stages, from entry through execution. Learn More |
|
0 comments:
Post a Comment