Honeypots as deception solutions: What to look for and how to buy

Email not displaying correctly? View it in your browser.

CSO

CSO Update

May 20, 2018
Featured Image

7 highest-paying IT security jobs, 2018

IT security is of major concern to all organizations, and they're willing to pay to get top talent. Are you being paid what you are worth? Take a minute to check. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Honeypots as deception solutions: What to look for and how to buy
How privacy is moving data security to the top of corporate agendas
GreyNoise: Knowing the difference between benign and malicious internet scans
What is Telegram and is it secure?
Short on security analysts? AI can help
One year later: security debt makes me WannaCry

Video/Webcast: ServiceNow Inc

Today's State of Vulnerability Response: Patch Work Requires Attention

Major data breaches are headline news, but well-publicized breaches are only the tip of the iceberg. To better understand why large scale breaches continue to occur, ServiceNow conducted a survey of more than 2,900 security professionals that are involved in vulnerability response across 9 countries. Read More

Thumbnail Image
INSIDER

Honeypots as deception solutions: What to look for and how to buy

Commercial and open source honeypot tools are now effective deception solutions. Here's what you need to know before implement them. Read More

Thumbnail Image
INSIDER

How privacy is moving data security to the top of corporate agendas

It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip. Read More

Thumbnail Image
INSIDER

GreyNoise: Knowing the difference between benign and malicious internet scans

Used with Shodan, this "search engine that looks at people scanning the internet" can help you pick bad actors out of the noise. Read More

Thumbnail Image

What is Telegram and is it secure?

The Telegram messaging app has grown in popularity since its launch in 2013, but not without controversy. Read More

Thumbnail Image

Short on security analysts? AI can help

A new study shows just nine percent of millennials are interested in cyber security careers. That means the shortage of security analysts will increase. With the onslaught of threats, and mountain of data coming into organizations daily, it’s time for artificial intelligence to step in. Read More

Thumbnail Image

One year later: security debt makes me WannaCry

WannaCry rocked the world one year ago, but there are still lessons for us to unpack about the debt we still have to pay to be secure. Read More

White Paper: CBTS

Estimated $12 billion spent on infrastructure - ZK Research

IT and business leaders today are focused on creating a more agile business! Evolving the WAN must be at the top of every IT and business leader's priority list because organizations can only be as agile as their least agile IT component - which, today, is the WAN. Read More

CSO Insider

1. 8 hot cyber security trends (and 4 going cold)
2. 11 tips to prevent phishing
3. Sample computer and e-mail usage policy
4. State of Cybercrime: Security events decline, but not the impact
5. 6 use cases for blockchain in security

Editor's Picks

1. What’s new in Windows 10 security features: The privacy edition
2. 11 ways to hack 2FA
3. 7 highest-paying IT security jobs, 2018
4. A quick tour of the Dark Web
5. What an Apple phishing attack looks like
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.