Tuesday, January 26, 2016

CISOs should take security training seriously

Time to Consider User Behavior Analytics (UBA)

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jan 26, 2016
Featured Image

CISOs should take security training seriously

Security awareness training is pivotal to your organization's information security posture, and, now, it's more important than ever before. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Time to Consider User Behavior Analytics (UBA)
Ta-ta to passwords and PINs; faces and fingerprints to rule the future
IoT and data privacy
Planning for security breaches: What CIOs need to know to stay out of the hot seat
Broad use of cloud services leaves enterprise data vulnerable to theft, report says
Critical vulnerabilities patched in Magento e-commerce platform
CIA: 10 Tips when investigating a flying saucer
TSA: Gun discoveries in baggage up 20% in 2015 over 2014

White Paper: Forcepoint

2015 Threat Report

Your data is crucial. It's impractical to completely "lock it down" and yet its open use threatens your organization's very existence. Forcepoint™ recognizes the delicate balance between security awareness and business enablement. Read More

Time to Consider User Behavior Analytics (UBA)

Market demand somewhat muted by market confusion. Read More

Thumbnail Image

Ta-ta to passwords and PINs; faces and fingerprints to rule the future

Biometric security technology is gaining market share over traditional passcode methods. Facial recognition will be a $450 million market by 2019 and fingerprint readers will reach $2.6 billion by 2020. Read More

Thumbnail Image

IoT and data privacy

On Jan. 28 we'll celebrate Data Privacy Day, which has a theme of of "Respecting Privacy, Safeguarding Data and Enabling Trust." Yet many Internet-of-Things devices are woefully insecure with the apps to control them asking for way too many permissions. Can all the players in IoT be trusted to respect privacy and safeguard our data? Unlike our infrastructure, IoT supposedly gives us a chance to do cybersecurity right from the start. Read More

Thumbnail Image
INSIDER

Planning for security breaches: What CIOs need to know to stay out of the hot seat

The C-suite is on the hot seat for security as companies face lawsuits stemming from security breaches, says Matthew Karlyn, Partner, Technology Transactions & Outsourcing Practice, Foley & Lardner LLP. Listen to Karlyn's CIO Perspectives keynote presentation to learn more about how CIOs can protect their companies and themselves from litigation. Read More

Thumbnail Image

Broad use of cloud services leaves enterprise data vulnerable to theft, report says

Workers excessively sharing documents in the cloud is a security problem. IT needs to get more on top of it, a new report says. Read More

Thumbnail Image

Critical vulnerabilities patched in Magento e-commerce platform

The latest patches for the Magento e-commerce platform fix critical vulnerabilities that could allow attackers to hijack administrative accounts. Read More

Thumbnail Image

CIA: 10 Tips when investigating a flying saucer

Most people don't typically associate the Central Intelligence Agency with historical UFO investigations but the agency did have a big role in such investigations many years ago. That's why I thought it was unusual and kind of interesting that the agency this week issued a release called "How to investigate a flying saucer." [The release is also a nod to the fact that the science fiction TV series X-Files returns to the screen this weekend] Read More

Thumbnail Image

TSA: Gun discoveries in baggage up 20% in 2015 over 2014

It's an astounding number really, but the details get worse. The TSA goes onto say 2,653 firearms were discovered in carry-on bags at checkpoints across the country, averaging more than seven firearms per day. Of those, 2,198 (83%) were loaded. Firearms were intercepted at a total of 236 airports; 12 more airports than last year. Read More

White Paper: Forcepoint

2016 Security Predictions

Are you prepared for security to mean "you can" as opposed to "you can't?" Cybersecurity within organizations now goes far beyond the essential everyday cost of doing business. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

9 Linux distros to watch in 2016

15 big data and analytics companies to watch Read More

Most-Read Stories

1. How Forbes inadvertently proved the anti-malware value of ad blockers
2. Peeping into 73,000 unsecured security cameras thanks to default passwords
3. 26 of the craziest and scariest things the TSA has found on travelers
4. 19 free cloud storage options
5. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
6. Verizon vows to build the first 5G network in the US
7. Aircraft part manufacturer says cybercrime incident cost it $54 million
8. Skype's real-time language translator goes live for Windows, iOS, and Android
9. Unpatched TRENDnet IP cameras still provide a real-time Peeping Tom paradise
10. Is Cisco keeping up its social responsibility efforts under new CEO Chuck Robbins?
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive