Security for your collaborative software

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Oct 04, 2016
Featured Image

Five tips for protecting your brand on social media

This summer, online payment service giant Paypal learned that bad guys had set up a fake Paypal Support page on Twitter, and then monitored the real Paypal Support page for remarks from customers. The bad guys responded to those inquiries and pointed users to the fake site where they would ask for, and sometimes receive, personal and account information – an attack called angler phishing. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Security for your collaborative software
Can you hack the vote? Yes, but not how you might think
Here are the 61 passwords that powered the Mirai IoT botnet
7 ways DevOps benefits CISOs and their security programs

White Paper: Neustar Inc

6 Questions You Should Ask Before Black Friday

The holidays can be a stressful time, especially for your network. Don't let the hackers and the humbugs bring you down. Get the answers you need from Neustar today. Read More

Thumbnail Image
INSIDER

Security for your collaborative software

There’s a gaping hole in your security infrastructure right now. The front door is open, the side window is ajar, and there’s an open safe with a neon sign saying “steal my data” in flashing lights. Read More

Can you hack the vote? Yes, but not how you might think

With Donald Trump already talking about the presidential election being rigged, Symantec has set up a simulated voting station that shows how electronic systems might be hacked to alter actual vote tallies for just a few hundred dollars. Read More

Thumbnail Image

Here are the 61 passwords that powered the Mirai IoT botnet

Default usernames and passwords have always been a massive problem in IT. These days, consumer technology that envelops the Internet of Things (IoT) has made the problem larger. Default credentials, which are ignored or too difficult for some people to change, are to blame for the development of a botnet that took part in the largest DDoS attack on record. Read More

Thumbnail Image

7 ways DevOps benefits CISOs and their security programs

Many organizations are regularly pushing out tens if not hundreds of releases and updates on a daily basis. With help and guidance from the security team, organizations can push secure releases on the first try and save lots of money and time along the way. Read More

White Paper: IBM Corporation

Accelerate Your Transformation into a Mobile Enterprise

This white paper will examine why becoming a mobile enterprise may be the best choice for your organization, how cloud can help you accelerate your transformation into a mobile enterprise, and the important things to consider when designing a mobile enterprise. Read More

Top 5 Stories

1. Pokémon Go's strategy could thwart cybersecurity threats
2. These ransomware tricks fool the most hardened security pro
3. Security myths that can make you laugh… or cry
4. Meet Apache Spot, a new open source project for cybersecurity
5. Why your employees are still a huge security risk

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.