Security Sessions: Tips for building a security team

Email not displaying correctly? View it in your browser.

CSO

CSO TechWatch

Mar 21, 2016
Featured Image

How to respond to ransomware threats

It all depends upon your level of risk and how badly you want the data returned to you unharmed. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Security Sessions: Tips for building a security team
CSO Threat Intelligence Survival Guide
Does a smartphone make two-factor authentication?
Identity theft, fraudsters, and what to know to prevent an attack
IT is getting cloud storage security all wrong

Video/Webcast: EMA Research

Advanced IT Analytics: A Look at Real Adoptions in the Real World

Join IT analyst firm EMA live April 13th @2PM EDT/ 11AM PDT as they discuss advanced IT analytics (AIA) including what is actually going on, who is successful and why. Read More

Thumbnail Image
Video

Security Sessions: Tips for building a security team

You're asked to build (or rebuild) a security team at your organization. What are some first steps and tips to keep in mind to maximize talent and efficiency in your new department? Josh Feinblum, VP of Information Security at Rapid7 has some advice. Watch Now

INSIDER

CSO Threat Intelligence Survival Guide

If enterprises want to understand how they can better invest in security defenses, build the necessary processes to respond to attacks, and mitigate the risks of a breach they need to get threat intelligence right. Read More

Thumbnail Image

Does a smartphone make two-factor authentication?

Is a cell phone a suitable second factor for two-factor authentication? Several infosec pros had a lively debate about this topic on Twitter recently. Read More

Thumbnail Image

Identity theft, fraudsters, and what to know to prevent an attack

IoT, EMV, and big data increase risks such as identity theft and cybercriminal activity. Read More

Thumbnail Image

IT is getting cloud storage security all wrong

Two recent reports confirm that your greatest security threat is your users, not outside hackers. Read More

White Paper: Paladion Networks

A Framework for Business Aligned Security Monitoring Use Cases

This white paper makes the case and provides a framework for applying business logic to Security Incident and Event Monitoring (SIEM), thereby improving detection capabilities, focusing resources on the highest impact areas. Read More

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO TechWatch as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.