Tuesday, November 29, 2016

Security budgets continue to grow, but is it enough?

Hiring the hidden gems: Should InfoSec hire from other industries?

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Nov 29, 2016
Featured Image

Security budgets continue to grow, but is it enough?

Cybersecurity is now a top concern for businesses, but the reality is that it should have been on their radar years ago. Why did businesses wait so long to invest in cybersecurity? Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Hiring the hidden gems: Should InfoSec hire from other industries?
How to protect the C-suite from spear phishing
Feds provide legal loophole to hacking IoT devices
SF MUNI starts to restore systems, says no data compromised during attack

Video/Webcast: Neustar Inc

Prevent DNS Catastrophes: Learn Best Practices on Shoring Up DNS for 2017

Good DNS management is pivotal to strong security. Is your DNS strategy ready for new types of attacks? Utilizing a single Managed DNS provider isn't the only answer. Tom Pageler, CRO & CSO at Neustar, and Michael Smith, Chief Compliance Office at Neustar will explore best practices of DNS management and how Neustar is taking steps to ensure DNS versatility. Read More

Thumbnail Image
INSIDER

Hiring the hidden gems: Should InfoSec hire from other industries?

The information security industry is in desperate need of skilled personnel. But, as CSO investigates, some of those professionals could potentially be sourced from other industries. Read More

Thumbnail Image
Video

How to protect the C-suite from spear phishing

CSO Editor-in-Chief Joan Goodchild sits down with Kevin O'Brien, founder and CEO of GreatHorn, to discuss ways that security leaders can fend off spear phishing attempts aimed at the executives at their companies. Watch Now

Thumbnail Image

Feds provide legal loophole to hacking IoT devices

For the next two years, "good-faith" security researchers will be allowed to hack into the software of most Internet of Things devices without risk of violating copyright laws. Whether that will lead to more cooperation or confrontation remains to be seen. Read More

Thumbnail Image

SF MUNI starts to restore systems, says no data compromised during attack

Focusing on the most critical systems first, the agency responsible for MUNI says IT teams are in the middle of their BCDR process this morning. The IT staff jumped into action after a ransomware attack forced some systems offline during the Thanksgiving holiday weekend. The agency also says that claims of data exfiltration by the attacker are false. Read More

White Paper: Connection

10 Reasons to Upgrade to Veritas Backup Exec 16

Veritas Backup Exec 16 delivers a backup and recovery solution that meets your data protection needs simply, with a host of powerful features. Read the 10 reasons you'll want to start using Backup Exec 16 to protect your environment. Read More

Top 5 Stories

1. Ransomware forces SFMTA to give free rides, $73,000 demanded by attackers
2. Voting security experts call on Clinton to demand recount
3. 10 top holiday phishing scams
4. Malicious images on Facebook lead to Locky Ransomware
5. U.S. says cybersecurity skills shortage is a myth

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive