Thursday, January 26, 2017

That online job candidate may be carrying a virus

Top data breach trends in 2016 — Phishing, skimming rise; hacking holds ground

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Jan 26, 2017
Featured Image

That online job candidate may be carrying a virus

LinkedIn and other social networks are becoming targets for threat actors since they know it's a great way to bypass company's defenses, according to cybersecurity firm Cylance. LinkedIn is typically a site that is not blocked by network filters to allow HR departments the freedom to communicate with prospective job candidates. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Top data breach trends in 2016 — Phishing, skimming rise; hacking holds ground
Machine behaviors that threaten enterprise security
A new service for the less techie criminals
10 questions to ask IDaaS vendors before you buy
Make cybersecurity great again!

White Paper: Sapho

Make Your Organization More Effective with Micro Apps

With more than 2 million mobile apps to choose from, most of us have installed at least 40 of them on our smartphones. Downloads from the Apple App Store alone surpassed 100 billion last year - and that number is expected to double in 2017. Read More

Thumbnail Image
INSIDER

Top data breach trends in 2016 — Phishing, skimming rise; hacking holds ground

In a year marked by massive data breaches, trends report finds skimming and phishing made waves in 2016. Read More

Thumbnail Image

Machine behaviors that threaten enterprise security

Machine learning has moved enterprise security forward, allowing for visibility inside the network in order to better understand user behavior. However, malicious actors are using what is done with machine learning on the inside in order to attack the perimeter. Read More

Thumbnail Image

A new service for the less techie criminals

Aditya K Sood, PhD, Director of Security and Cloud Threat Labs, Blue Coat Systems, a part of Symantec, details how cybercriminals can obtain sensitive data, like credit card numbers, names and addresses, with just a couple of clicks and a payment. Read More

Thumbnail Image
INSIDER

10 questions to ask IDaaS vendors before you buy

Of the Everests that IT faces daily, identity and access management is a particular challenge. These 10 questions help you find a solution that delivers what you need. Read More

Thumbnail Image

Make cybersecurity great again!

We are losing the battle of cybersecurity, cyber criminals put 100% into planning and attacks and we cant even fund a cyber security role for all internet-connect businesses! Read More

White Paper: Cloudian

Modern, Cloud-conscious Approaches to Data Protection

Most data protection solutions make you choose between two imperfect storage options: high-cost disk or high-maintenance tape. There is a third option: object storage as a backup target. This analyst research note discusses how object storage works, how it uniquely solves the data protection challenge, and how it helps you meet your backup SLAs at 70% less cost than purpose-build backup appliances. Read More

Top 5 Stories

1. IRS to delay tax refunds as a security precaution
2. Your favourite VPN app is harvesting your personal information
3. How to wake the enterprise from IoT security nightmares
4. 10 scary things the TSA found on your fellow travelers
5. 7 (more) security TED Talks you can't miss

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive