Sunday, March 6, 2016

Hacking back will only get you in more trouble

Attacks are basically the same no matter the industry

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Mar 06, 2016
Featured Image

Hacking back will only get you in more trouble

Economic espionage is a serious problem with no demonstrably effective responses so far. But a panel of experts at the RSA conference agreed that hacking back is the worst of available options. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Attacks are basically the same no matter the industry
Amazon disabled encryption on its tablets and phones because nobody used it
Is DevOps the Holy Grail for information security?

Research/Infographic: Level 3 Communications

Communicate Simply. Migrate Confidently.

Simple conversations live at the heart of business. Level 3 Voice Complete lets you easily migrate to SIP, enabling you to have those conversations with customers, colleagues and partners with far greater reliability and security. Read More

Thumbnail Image

Attacks are basically the same no matter the industry

Note to the newbies: The cyberattack on Ukraine power grid proves threats to infrastructure are real Read More

Thumbnail Image

Amazon disabled encryption on its tablets and phones because nobody used it

Amazon caught flack on Wednesday for disabling the encryption capabilities of its Fire phones and tablets with a software update. The company says its reasoning was simple: people didn't use it. Read More

Thumbnail Image

Is DevOps the Holy Grail for information security?

DevOps is the computing philosophy that, through unified agile software development and business operations, you can improve your products and time to market. But does it actually improve information security? Read More

Research/Infographic: Level 3 Communications

Connecting and Protecting the Networked World

Regardless of the cloud provider or solution architecture you choose, Level 3 will help you understand your options and develop a low-risk cloud deployment strategy built around your specific business needs. Read More

Top 5 Stories

1. Latest attack against TLS shows the pitfalls of intentionally weakening encryption
2. The FBI should try to unlock a shooter's iPhone without Apple's help, a lawmaker says
3. Cisco issues critical patch for Nexus switches to remove hardcoded credentials
4. RSA: Geolocation shows just how dead privacy is
5. Next-generation endpoint security tools ready to replace antivirus

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive