Sunday, March 27, 2016

9 biggest information security threats through 2018

Should your board of directors include a cybersecurity expert?

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Mar 27, 2016
Featured Image

9 biggest information security threats through 2018

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security threats over a two-year period. Here are the top nine threats to watch for through 2018. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Should your board of directors include a cybersecurity expert?
Chip-and-PIN adoption still slow
Why you need a CSO/CISO
New York Stock Exchange to host CSO summit
The journey to CISO

White Paper: CrowdStrike

5 Reasons Endpoint Security Must Move to the Cloud

Learn how the Cloud makes it possible to regain unprecedented control over endpoints while detecting, preventing, and responding to attacks in a way that far surpasses on-premise architectures. Read More

Thumbnail Image
INSIDER

Should your board of directors include a cybersecurity expert?

The pros and cons of proposed legislation to identify a board's cybersecurity pro. Read More

Thumbnail Image

Chip-and-PIN adoption still slow

The deadline to switch from credit cards processed with a magnetic stripe to those with an embedded chip was last Oct. 1. Almost six months later, the percentage of retail outlets equipped for "chip-and-PIN" is somewhere between 17% and 37% – and many of them aren't using it as intended. Advocates say these things take time – that adoption is slow but steady. Read More

Thumbnail Image
INSIDER

Why you need a CSO/CISO

When it comes to security, you're better off employing a specialist. However, according to recent research, less than half of companies employ a CSO/CISO. Read More

Thumbnail Image

New York Stock Exchange to host CSO summit

Chief security officers are invited to a Wall Street cyber investing conference on May 3, 2016. Read More

Thumbnail Image

The journey to CISO

The path to CISO does not always start with a computer science degree Read More

White Paper: ForgeRock

Customer-Focused Organizations Must Take a Strategic Approach to "Identity Relationship Management"

In conducting online surveys of 111 B2C and B2B2C executives with responsibility for IAM, Forrester found that new business and technical demands require a strategic focus for which existing IAM infrastructure may not be sufficient. Read More

Top 5 Stories

1. This bag of tricks may help stop a Locky ransomware infection
2. Company behind the Badlock disclosure says pre-patch hype is good for business
3. Stealthy USB Trojan hides in portable applications, targets air-gapped systems
4. Social engineering 101: 18 ways to hack a human [Infographic]
5. Google warns of Android flaw used to gain root access

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive