Vulnerability hits Intel enterprise PCs going back 10 years

Email not displaying correctly? View it in your browser.

CSO

CSO Update

May 02, 2017
Featured Image

How can CSOs protect their CEO?

CEOs have a high level of visibility outside the organization and attackers can leverage the data they collect as a way to target them for cybersecurity attacks. Organizations can help protect your CEO from cybersecurity attacks by leveraging the following tips provided by security company Spirent’s David DeSanto. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Vulnerability hits Intel enterprise PCs going back 10 years
Report: Bad policies and practices put data at risk [Infographic]
SMBs continue to be a target of cybercriminals
Security automation is maturing, but many firms not ready for adoption
Three shades of hackers: The differences among the white, grey, and black hats
How the insurance industry could change the game for security

Video/Webcast: CDW Corporation

Managing the Modern Desktop

Please join us for this live discussion to hear how Workspace ONE is providing a single, uniform, self-service experience for end-users to access all of their applications from any device. Date: Wednesday, May 10, 2017, 01:00 PM EDT Read More

Thumbnail Image

Vulnerability hits Intel enterprise PCs going back 10 years

Intel is reporting a firmware vulnerability that could let attackers take over remote management functions on computers built over the past decade. Read More

Thumbnail Image
INSIDER

Report: Bad policies and practices put data at risk [Infographic]

The 2017 Varonis Data Risk Report shows the scope of the risk associated with corporate data files. Read More

Thumbnail Image

SMBs continue to be a target of cybercriminals

Believing that their security program is good enough means there's a good chance they’ll be breached. Here are some lessons from the bigs guys for the SMBs. Read More

Thumbnail Image

Security automation is maturing, but many firms not ready for adoption

The security automation industry is still in its infancy, with most vendors just a year or two old, but there are already some promising technologies that enterprises can put to use - if they have already laid the required ground work. Read More

Thumbnail Image
INSIDER

Three shades of hackers: The differences among the white, grey, and black hats

This infographic explains why hackers are defined by the hats they wear. Read More

Thumbnail Image

How the insurance industry could change the game for security

The recent growth in the cyber insurance market is already improving security in some industry segments, and has the potential to do more -- if the industry is able to address its data problem Read More

White Paper: IBM Corporation

7 Proven Practices

The effort it takes to get an application from development to production can be a long and painful process, but it doesn't have to be. Proper release management practices can ease the pain in deployment processes and get the applications deployed quickly and successfully. Read this paper to learn how proper release management practices and tools can help you deploy applications successfully and continuously! Read More

Top 5 Stories

1. Stealthy Mac malware spies on encrypted browser traffic
2. Report: Top 25 IT security products
3. There's now a tool to test for NSA spyware
4. No, Netflix is not a victim of Ransomware
5. Medical devices that could put you at security risk

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.