Thursday, March 24, 2016

Security spring cleaning time

Social engineering 101: 18 ways to hack a human [Infographic]

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Mar 24, 2016
Featured Image

Security spring cleaning time

With the day-to-day activities, often older security products and software are just set aside making for a big pile in your network. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Social engineering 101: 18 ways to hack a human [Infographic]
Security industry needs strategic thinking and a new hiring strategy
Machine learning is reshaping security
Should you worry that your car will be hacked?
Chip-and-PIN adoption still slow

Video/Webcast: Check Point Software Technologies Ltd.

A New Model for Security Management

Join us live April 5th @11:00 AM EDT for this webcast to understand the trends that are disrupting the way security is managed today. Read More

Thumbnail Image
INSIDER

Social engineering 101: 18 ways to hack a human [Infographic]

Hackers use these common tactics to prey on your humanity. Here's what you need to know to keep you, your users, and your business safe. Read More

Thumbnail Image

Security industry needs strategic thinking and a new hiring strategy

The days of doing a good job at basic operations are gone, so those interested in security need to have highly specialized skills and be strategic thinkers. Read More

Thumbnail Image

Machine learning is reshaping security

At the recent RSA Conference it was virtually impossible to find a vendor that was not claiming to use machine learning. Both new and established companies are now touting "machine learning" as a major component of the data science being used in their products. This article answers the following: What the heck is machine learning anyway? And is it really going to reshape cyber security in 2016? Read More

Thumbnail Image

Should you worry that your car will be hacked?

The government's warning to the general public and manufacturers of vehicles highlights the potential issues and cybersecurity threats related to connected vehicle technologies. But should we really be worried someone may take control of our car? Read More

Thumbnail Image

Chip-and-PIN adoption still slow

The deadline to switch from credit cards processed with a magnetic stripe to those with an embedded chip was last Oct. 1. Almost six months later, the percentage of retail outlets equipped for "chip-and-PIN" is somewhere between 17% and 37% – and many of them aren't using it as intended. Advocates say these things take time – that adoption is slow but steady. Read More

White Paper: Parasoft Corporation

Forrester: Parasoft the Leader in Test Automation

This Forrester Wave report evaluates 9 functional test automation tool vendors across 40 criteria to help organizations working on enterprise, mobile, and web applications select the right tool. Read More

Top 5 Stories

1. Tesla Model S hacking keynote during CeBIT triggers outrage
2. A Blue Team's reference guide to dealing with Ransomware
3. Google warns of Android flaw used to gain root access to devices
4. 27% of US office workers would sell their passwords
5. Celebgate: Social engineering used to steal celebrity

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive