Sunday, May 22, 2016

SOURCE Boston: Medical devices still vulnerable, but things may be changing

Salted Hash Rehashed: The weekly news recap for May 20, 2016

Email not displaying correctly? View it in your browser.

CSO

CSO Update

May 22, 2016
Featured Image

SOURCE Boston: Medical devices still vulnerable, but things may be changing

Connected medical devices bring life-sustaining therapy and convenience to millions of people. But they remain vulnerable to online attackers. The goal of some security companies is to change that. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Salted Hash Rehashed: The weekly news recap for May 20, 2016
Is lack of gender diversity in tech really shocking?
How employees can share the IT security load
Detecting low and slow insider threats

White Paper: SanDisk

Cloud Architects Choose Datacenter Flash to Power Industry's Clouds

Cloud architects designing public and private clouds must satisfy business needs while meeting cloud infrastructure scale, performance, and agility requirements. This is why flash technology has become an integral part of storage needs for cloud applications moving forward and will continue to be an important part of data center design in the future. Read More

Thumbnail Image

Salted Hash Rehashed: The weekly news recap for May 20, 2016

Welcome to this week's edition of Rehashed, your weekly recap of news and other items of note. We're going to start running these on Friday, mostly because it's easier to produce this way. This week, a trusted contact Phished me, there were issues with Pornhub, and once again LinkedIn users need to reset their passwords. Read More

Thumbnail Image

Is lack of gender diversity in tech really shocking?

Male privilege and its impact on work place diversity and culture in the tech industry Read More

Thumbnail Image

How employees can share the IT security load

Security threats weigh heavily on IT and security professionals, and it is a responsibility that they should not bear alone. We all need to do our part to uphold the safeguarding of sensitive data. Read More

Thumbnail Image

Detecting low and slow insider threats

In my last post I discussed how machine learning could be used to detect phishing-based account compromise attacks using a real-world use case from the recent Verizon Data Breach Digest. This time I'll examine how to detect insider threats using similar techniques. Read More

White Paper: Sophos Inc

Deciphering the Code: A Simple Guide to Encryption

This whitepaper provides an overview of encryption, things to consider when planning an encryption strategy and what to look out for when choosing an encryption solution. Read More

Top 5 Stories

1. Top 10 ways to retain IT security talent
2. Pornhub said to be compromised, shell access available for $1,000
3. Basic Phishing scam successfully targets PR agency, reporters
4. A hacker is selling 167 million LinkedIn user records
5. Stealthy malware Skimer helps hackers easily steal cash from ATMs

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive