ICYMI: The 10 essential Reddits for security pros

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Mar 16, 2017
Featured Image

Inside the Russian hack of Yahoo: How they did it

One mistaken click. That's all it took for hackers aligned with the Russian state security service to gain access to Yahoo's network and potentially the email messages and private information of as many as 500 million people. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

ICYMI: The 10 essential Reddits for security pros
7 tips for developing a powerful data disaster plan
Continuous authentication: Why it’s getting attention and what you need to know
The IT equipment you can take into battle
Tricks that ransomware uses to fool you
10 must-ask questions for evaluating EDR tools

White Paper: OpenText

10 Strategies to Navigate the Shift from ECM to Content Services

Read this AIIM ebook to get a list of action items that will help you make the transition to content services. Read More

Thumbnail Image
INSIDER

ICYMI: The 10 essential Reddits for security pros

Here, we’ve gathered 10 of the best cybersecurity Reddits so you don’t have to waste any time and can get straight to what you are looking for. Read More

Thumbnail Image

7 tips for developing a powerful data disaster plan

Commvault has provided the following tips that will help enterprises develop simple yet powerful holistic data protection plans that enable enterprises to quickly recovery the data they need if there is a data disaster, in an affordable manner that does not break the bank. Read More

Thumbnail Image

Continuous authentication: Why it’s getting attention and what you need to know

In some cases traditional authentication processes are not enough to provide strong security throughout a user work session. That’s where continuous authentication comes in. Read More

Thumbnail Image

The IT equipment you can take into battle

If you're in IT, you're as familiar with your laptop and your cell phone as a farmer is with his tools. And just like Japanese farmers with their kama, you might find yourself using one of those tools in battle, for offense or defense. We admit, that's pretty unlikely—but we'll step you through some of the odder possibilities. Read More

Thumbnail Image

Tricks that ransomware uses to fool you

Cyphort has examined different variants of ransomware to help users get an idea of what might be coming down the Internet pipeline. So keep an eye out for these characteristics before your network is taken hostage. Read More

Thumbnail Image
INSIDER

10 must-ask questions for evaluating EDR tools

Are you thinking about investing in an endpoint detection and response solution? These pre-purchase questions will help you find the tool that meets your needs. Read More

White Paper: Flashpoint

Flashpoint: Evolve Threat Intel to Business Risk Intelligence

The latest Enterprise Strategy Group Solution Showcase focuses on the evolution of threat intelligence to Business Risk Intelligence, led by Flashpoint, and examines the current state of the threat intelligence market, the challenges of automating and operationalizing threat intelligence, and how Flashpoint can help organizations mitigate their business risk. Download the document. Read More

Top 5 Stories

1. How to remove ransomware: Use this battle plan to fight back
2. WikiLeaks dump brings CIA spying powers into the spotlight
3. Disaster recovery: How is your business set up to survive an outage
4. Spammers expose their entire operation through bad backups
5. Online cybersecurity course targets business professionals

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.