Steps to take today to reduce the risk when people leave tomorrow

Email not displaying correctly? View it in your browser.

CSO

CSO Risk Management

Jul 01, 2016
Featured Image
Video

Security Sessions: Is hospital security on life support?

In this episode of Security Sessions, CSO Editor-in-Chief Joan Goochild speaks with Ted Harrington from Independent Security Evaluators about how vulnerable hospitals are in protecting patient health. Watch Now

Twitter Facebook LinkedIn

Your Must-Read Stories

Steps to take today to reduce the risk when people leave tomorrow
Data protection strategy for mobile devices
A pen test a day keeps hackers away
11 ways to fight off ransomware
Catching a RAT by the tail
Identify the “who” in risk mitigation

White Paper: IBM Corporation

Addressing NIST and DOD Requirements for Mobile Device Management (MDM)

Essential capabilities for secure mobility. In this white paper we will look at NIST and DISA efforts to articulate requirements for Mobile Device Management. Read More

Thumbnail Image

Steps to take today to reduce the risk when people leave tomorrow

Mike Tierney is back with a plan of action for security leaders on protecting company information Read More

Thumbnail Image

Data protection strategy for mobile devices

So the question remains unanswered, what sort of technology can enterprises include in their data protection strategy to prevent data loss from mobile devices and what are the solutions available today to address these challenges. Read More

Thumbnail Image

A pen test a day keeps hackers away

Penetration testing has evolved from a nice to have test to a mandatory test, Besides compliance a PEN test will tell you just how secure your organizations data really is. Your network is being scanned and attacked daily, don't wait to be the next breach headline. Get that PEN test now and learn just how easily an ethical hacker can gain access to your organizations data. Read More

Thumbnail Image

11 ways to fight off ransomware

These tips will help keep your PC safe from malware. Read More

Thumbnail Image

Catching a RAT by the tail

Last month I examined how machine learning could be used to detect low and slow insider threats. In this, the final installment of my trilogy on real-world use cases from the recent Verizon Data Breach Digest, I’ll discuss how remote access threats can be exposed with the machine learning techniques I’ve covered in my two previous blogs. Read More

Thumbnail Image

Identify the “who” in risk mitigation

Risk management strategies are designed for organizations seeking to improve their resilience in the face of a dynamic and ever-changing threat landscape. Knowing the “whos” will greatly assist organizations in developing unique strategies that fit their risk management needs, by forcing them to look beyond themselves and at those stakeholders that may have gone unnoticed. In the end, risk management is many-faced, and a good strategy will represent all of those interests. Read More

Video/Webcast: KnowBe4

Are You Protected Against the Weakest Link in Network Security?

The bad guys are just one gullible user click away from staging an all-out invasion. Watch this 2-minute video and learn how you can keep your users on their toes with security top of mind. Read More

Top 5 Stories

1. Researchers steal data from a PC by controllng the noise from the fans
2. 11 ways to fight off ransomware
3. Broken Phishing scam targets several tech journalists
4. The quickest way to annoy a privacy pro
5. Hard Rock Las Vegas suffers a second data breach

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Risk Management as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.