Thursday, August 25, 2016

How can we improve awareness training?

10 tips for retaining top IT talent

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Aug 25, 2016
Featured Image

How can we improve awareness training?

Bill Rosenthal from Logical Operations chats with CSO about the failings of end user security training, and where security managers can look to make improvements Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

10 tips for retaining top IT talent
55% off Akface Smart Wifi Power Plug - Deal Alert
What you need to do to stop data from leaving with exiting employees
Data lakes security could use a life preserver
In defense of "Good Enough" security

White Paper: Samsung

Biometric Authentication: The Future Is Now

Challenges with password management are leading more organizations to adopt biometric authentication solutions. In fact, a recent IDG Research survey of executives in the financial services and insurance industries finds that some firms are already adopting biometrics, and many more are looking to make the transformation in relatively short order. Read More

Thumbnail Image
INSIDER

10 tips for retaining top IT talent

When it comes to employee retention, tech companies have some of the highest turnover rates of any industry. Retaining top IT talent is a struggle for many businesses, but there are several things you can do to increase the likelihood of your young, talented tech team sticking around a little longer than average. Read More

Thumbnail Image
DealPost

55% off Akface Smart Wifi Power Plug - Deal Alert

Remotely turn appliances and electronics on or off from anywhere. Perfect for Household Appliances Lamps, Lighting & Electrical Equipment. Currently discounted 55%. Read More

Thumbnail Image

What you need to do to stop data from leaving with exiting employees

In some instances it is inadvertent that an employee takes files with them when they leave a job. But in most cases, it is done to get an advantage at their next job. Here is what you should do before they leave the premises. Read More

Thumbnail Image

Data lakes security could use a life preserver

As big data initiatives gain steam at organizations, many companies are creating "data lakes" to provide a large number of users with access to the data they need. And as with almost every type of new IT initiative, this comes with a variety of security risks that enterprises must address. Read More

Thumbnail Image

In defense of "Good Enough" security

Every few weeks it seems like the list of security technology declared "dead" or broken grows. But are we actually putting ourselves at greater danger by avoiding any technique or product that falls on that list? Read More

Video/Webcast: CloudPassage

The True Security Risks of IaaS: Don't Worry About The Wrong Things

As more organizations are moving their applications to be hosted with various Infrastructure as a Service providers, security teams have a whole new list of security concerns. But are those worries warranted? Read More

Top 5 Stories

1. 10 year-old teaches hackers a valuable lesson in privacy
2. How cyber attacks work [Infographic]
3. Hackers say leaked NSA tools came from contractor at RedSeal
4. The best places to live for cybersecurity jobs that pay
5. Attackers don't need vulnerabilities when the basics work just as well

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive