Securing risky network ports

Email not displaying correctly? View it in your browser.

CSO

CSO Risk Management

May 01, 2017
Featured Image

Prevent or detect? What to do about vulnerabilities

A good security program includes prevention, detection, and response, so security practitioners need to focus on the vulnerabilities that matter. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Securing risky network ports
How to clean up security vulnerabilities with better cyber hygiene
Top 5 email security best practices to prevent malware distribution
What C-level leaders need to know about cybersecurity
Detecting insider threats is easier than you think
The rising security risk of the citizen developer

White Paper: Scandit

Enabling Seamless Retail with Mobile Data Capture

This white paper will examine in detail how mobile data capture solution deployment can enable retailers to connect every area of the enterprise and provide customers with a true seamless shopping experience no matter if they're shopping online, in-store or on the go. Read More

Thumbnail Image

Securing risky network ports

CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings. Read More

Thumbnail Image

How to clean up security vulnerabilities with better cyber hygiene

One of the more neglected aspects of network security is people. Just as we grew up learning good personal hygiene practices, we are now obligated to teach similar practices among the users of our networks to prevent cyber attacks and data breaches. Read More

Thumbnail Image

Top 5 email security best practices to prevent malware distribution

With email representing an open, trusted channel that allows malware to piggyback on any document to infect a network, it’s often up to the organizations – their security teams and employees – to adopt appropriate security strategies and best practices to prevent a company-wide attack. Read More

Thumbnail Image

What C-level leaders need to know about cybersecurity

Corporate boards are rarely prepared for cyberattacks -- and when they occur everybody likes to point fingers at everyone else. Read More

Thumbnail Image

Detecting insider threats is easier than you think

Security experts weigh in on stopping the danger from your own employees. Access and security awareness training are the main themes to finding the danger that is within your own walls. Read More

Thumbnail Image

The rising security risk of the citizen developer

Citizen developers may help enterprises to develop apps more quickly, but what is this new breed of developer going to do to enterprise security? Read More

White Paper: Scandit

Total Cost of Ownership of Mobile Barcode Scanning

As more and more enterprises begin to embrace mobile technology, it's important to keep total cost of ownership in mind. To help ease the decision making, we developed a comparison of the cost and feature differences between popular barcode scanning devices that highlights one of the most important metrics for decision makers: total cost of ownership (TCO). Read More

Top 5 Stories

1. Report: Top 25 IT security products
2. Contrast Security responds to OWASP Top 10 controversy
3. Five ways the U.S. is educating cybersecurity talent – and what's still missing
4. Latest OWASP Top 10 looks at APIs, web apps
5. Old Windows Server machines can still fend off hacks.

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Risk Management as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.