Sunday, September 25, 2016

Research report: IT security's looming tipping point

Here's what you should know, and do, about the Yahoo breach

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Sep 25, 2016
Featured Image

Research report: IT security's looming tipping point

Even as security draws board-level attention, many IT professionals give their organizations' infosec practices low marks. This special report from CIO, CSO and Computerworld reveals how to tip the balance in the right direction. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Here's what you should know, and do, about the Yahoo breach
Security is no fiction: Infosec on TV, film—and in space
ICS vulnerabilities are still rampant
CISOs shouldn't wait until retirement for social security

White Paper: Trend Micro Incorporated

4 Countermeasures to Protect Against Ransomware

By now, not only security professionals, but also many knowledge workers and consumers are well aware of the insidious nature of ransomware. As its name implies, ransomware is malicious software that holds data files hostage pending the payment of a ransom, typically with untraceable bitcoin as the currency of choice. Read More

Thumbnail Image

Here's what you should know, and do, about the Yahoo breach

Yahoo's announcement that state-sponsored hackers have stolen the details of at least 500 million accounts shocks both through scale -- it's the largest data breach ever -- and the potential security implications for users. Read More

Thumbnail Image

Security is no fiction: Infosec on TV, film—and in space

Has film and TV depiction of IT security gotten any better since the '80s? We quizzed some tech pros hear their favorites and learn about the worst offenders. Read More

Thumbnail Image

ICS vulnerabilities are still rampant

Industrial control systems are part of the nation's critical infrastructure. But according to a panel of security experts, they remain catastrophically vulnerable to cyber attacks. Read More

Thumbnail Image

CISOs shouldn't wait until retirement for social security

A security industry expert says CISOs should be responsible for cyber defending the social media accounts belonging to employees at their organizations... and they should be doing it now. Read More

White Paper: Hitachi

Accelerate Your Digital Transformation Infographic - Three Keys to Digital Transformation

Digital disruption threatens organizations of all kinds, overturning entrenched businesses and old ways of thinking. Learn these three important drivers of digital transformation, and why you must innovate and transform today to overcome disruption. Use these three drivers to begin your own digital transformation journey. Read More

Top 5 Stories

1. Five social engineering scams employees still fall for
2. How to spot a phishing email
3. Zero-percent cybersecurity unemployment, 1 million jobs unfilled
4. Investment fund loses $6 million in BEC scam, suspends operations
5. Security is no fiction: Infosec on TV, film—and in space

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive