Thursday, February 23, 2017

How the DOT discovered its network was compromised by shadow IT

FDA 'guides' the way to medical device security

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Feb 23, 2017
Featured Image

How the DOT discovered its network was compromised by shadow IT

Finding of hundreds of pieces of unauthorized networking equipment, including many off-the-shelf consumer-grade devices, compelled the Department of Transportation CIO to alert department leadership and launch a rearchitecture of the network. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

FDA 'guides' the way to medical device security
Hey New York - ready for CyberSOX?
Cybersecurity: What does the board want?
Why you need a bug bounty program
7 Wi-Fi vulnerabilities beyond weak passwords
5 ways to spot a phishing email

White Paper: GE Power

2017: Top Digital Trends for the Electricity Value Network

Read about the 2017 top digital trend predictions for the power and utility industry, and gain a competitive edge by understanding what's next. Across the Electricity Value Network (EVN) - from generation through T&D and end user management, first movers and proactive digital adopters are far more likely to thrive in the future. Read More

Thumbnail Image

FDA 'guides' the way to medical device security

The FDA's "guidance" documents on medical device security are non-binding. But advocates say they will still have plenty of legal force – especially when it comes to things like insurance or civil suits for damages from insecure devices. Read More

Thumbnail Image

Hey New York - ready for CyberSOX?

If your organization is regulated by New York State's Department of Financial Services (DFS), your organization will need to comply with a new cybersecurity regulation that goes into effect on March 1, 2017. Read More

Thumbnail Image

Cybersecurity: What does the board want?

Summary of the 2017 NACD Cyber-risk Handbook and its recommendations for directors. Action items for CISOs. Read More

Thumbnail Image
INSIDER

Why you need a bug bounty program

If you're ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do. Read More

Thumbnail Image
INSIDER

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you're not exposed in these other ways. Read More

Thumbnail Image

5 ways to spot a phishing email

Think you're clever enough to recognize a phishing attempt? Think again. Cybercriminals are getting smarter and their phishing skills are getting better, but we've put together this list of clues to help you avoid a costly error. Read More

White Paper: GE Power

7 Ways to Achieve Operations Reliability with APM

Things are happening to your assets that you can't see - things that can stop operations at the worst possible time. What you need is a bird's eye view coupled with drill-down alerts before an issue leads to production downtime. Read More

Top 5 Stories

1. CrowdStrike attempts to sue NSS Labs to prevent test release, court denies request
2. Cylance accuses AV-Comparatives and MRG Effitas of fraud and software piracy
3. Vendors respond to Cylance's new testing methods with AV-TEST
4. Phishing campaign uses Yahoo breach to hook email
5. Salted Hash: RSA Conference 2017 – Live Blog

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:03 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive