15 tricks to hold off the hackers

Email not displaying correctly? View it in your browser.

CSO

CSO TechWatch

May 07, 2017
Featured Image
INSIDER

Report: Top 25 IT security products

Download this exclusive report highlighting 25 top security products – as rated by actual enterprise users of the products – in categories such as cloud security, firewalls, SIEM, application security and IoT security. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

15 tricks to hold off the hackers
Securing risky network ports
9 questions to ask when selecting application security solutions
How to track and secure open source in your enterprise
Security-as-a-service model gains traction
State-of-the-art multifactor authentication (MFA) technologies

Video/Webcast: Coresite

3 Ways to Leverage Colocation for Business Continuity Planning

Business continuity is moving up the list of enterprise IT priorities, and there are more choices for aligning cloud models with business objectives. When you are evaluating a solution, you should bear three models in mind - classic, virtual and hybrid. In this video, we highlight the advantages of each. Read More

Thumbnail Image
INSIDER

15 tricks to hold off the hackers

To root out persistent hackers, sometimes you have to get a little creative Read More

Thumbnail Image

Securing risky network ports

CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings. Read More

Thumbnail Image

9 questions to ask when selecting application security solutions

Organizations need to determine the right tools to stay relatively risk free. Open source security vendor Black Duck explains why asking these key questions can help you determine the right mix of application tools and capabilities for your organizations. Read More

Thumbnail Image
INSIDER

How to track and secure open source in your enterprise

Your developers are using open source — even if you don't know about it. Here's how to take control and why you need to. Read More

Thumbnail Image

Security-as-a-service model gains traction

A new report finds mid-tier companies are increasingly turning to security-as-a-service offerings to manage their network security needs. Read More

Thumbnail Image

State-of-the-art multifactor authentication (MFA) technologies

Multifactor authentication offers more, better factors/options to protect credentials and data than ever. Read More

White Paper: Coresite

Best Practices: Leveraging Cloud and Colocation to Avoid Downtime

It is critical for business applications to be up and running 100% of the time, but managing IT infrastructure is complex. In this white paper, we compare three business continuity models that address traditional and emerging threats, and make recommendations on how to streamline your solution. Read More

Top 5 Stories

1. Making sense of cybersecurity qualifications
2. Recent Google Docs Phishing attack is a win for Blue Teams
3. Believe your employer doesn’t know about your legal problems? Think again
4. Google Drive phishing is back -- with obfuscation
5. How the insurance industry could change the game for security

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO TechWatch as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.