Ways to improve security education in the New Year

Email not displaying correctly? View it in your browser.

CSO

CSO Security Awareness Weekly

Dec 19, 2016
Featured Image

Hackers get around AI with flooding, poisoning and social engineering

Machine learning technologies can help companies spot suspicious user behaviors, malicious software, and fraudulent purchases -- but even as the defensive technologies are getting better, attackers are finding ways to get around them Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Ways to improve security education in the New Year
10 biggest hacks of user data in 2016
Keeping the C-suite from getting speared by phishing

Virtual Event: WGroup

Effective Multi-Vendor IT Governance

As more IT services and applications are outsourced to third-party vendors, it becomes increasingly important for companies to understand how to effectively manage vendors and conduct governance meetings at predefined intervals. This allows organizations to take full advantage of IT-vendor relationships by providing the opportunity to strategize, review, align goals, and hold vendors accountable for their performance. Read More

Thumbnail Image

Ways to improve security education in the New Year

As 2016 comes to a close, there are a few types of security advice we should strive to avoid. With all the inevitable confusion about effective ways of protecting our data and machines, security experts need to make sure the information we're giving is both clear and current. Read More

Thumbnail Image
INSIDER

10 biggest hacks of user data in 2016

You take great pains to come up with a strong password when registering for an account on a website -- only to see your efforts go for naught when that site gets hacked. Several sites had their databases of user accounts not only breached but stolen this year, which include the necessary information for logins (i.e. username, password). The following sites are ranked starting at the fewest number of user accounts with passwords that were taken. Read More

Thumbnail Image

Keeping the C-suite from getting speared by phishing

Executives are some of the biggest targets- and sometimes the easiest prey - for spear phishing criminals. Here are tips for how security managers can go beyond awareness training to keep the top-level out of danger Read More

Research/Infographic: Bay Dynamics

How to Minimize False Positives, Reduce Noise & Prioritize Alerts

Security Operations Centers are inundated with countless threat alerts from their various security tools. Incident responders sift through the pile, hoping they chase down the imminent ones, only to find out later that they wasted their time. White they were investigating what they thought was a high severity alerts, was in fact low in severity, leaving the true threat untouched and able to attack the organization. Read More

Top 5 Stories

1. Nearly half of all websites pose security risks
2. Data enrichment records for 200 million people up for sale on the darknet
3. Top 15 security predictions for 2017
4. Trump's margin up after Wisconsin recount over voting machine security
5. 2017 cybersecurity events calendar featuring major and niche conferences

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Security Awareness Weekly as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.