April 2017: The month in hacks and breaches

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

May 03, 2017
Featured Image

Shodan search engine starts unmasking malware command-and-control servers

There's now a new tool that could allow researchers and companies to quickly block communications between some malware families and their constantly changing command-and-control servers. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

April 2017: The month in hacks and breaches
46% off Razer Kraken Pro Gaming Headset for PC, Xbox One and Playstation 4 - Deal Alert
Boston Fed conference: Security still comes down to the basics
False positives still cause threat alert fatigue
Making sense of cybersecurity qualifications
Human weakness enabling financial cybercrime
Cybersecurity threats that keep the banks up at night

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image
INSIDER

April 2017: The month in hacks and breaches

Hacked emergency alarms, DDoS attack down under, extortion, and garden variety data losses and privacy breaches mark the month of April. Read More

Thumbnail Image
DealPost

46% off Razer Kraken Pro Gaming Headset for PC, Xbox One and Playstation 4 - Deal Alert

The Razer Kraken Pro, a gaming headset fully focused on ergonomics for the head. Weight, functionality and performance make this perfectly balanced for the most comfortable gaming headset. Read More

Thumbnail Image

Boston Fed conference: Security still comes down to the basics

Not every bank has the money or the staff to do everything on the “best practices” lists of multiple regulatory agencies. But multiple speakers and panelists at the Boston Fed’s 2017 Cybersecurity Conference agreed that most financial institutions, no matter their size, can do the basics. Read More

Thumbnail Image

False positives still cause threat alert fatigue

How you set up and prioritize which alerts to look at and act on is the basis for an effective threat management strategy. Read More

Thumbnail Image

Making sense of cybersecurity qualifications

Organizations push for equitable and transparent credentials. Several credentialing initiatives are in the works to make cybersecurity credentials easier to understand and classify according to their value. Read More

Thumbnail Image

Human weakness enabling financial cybercrime

Cybercrime costs $3 trillion worldwide. One reason, a Boston police detective told a Boston banking audience, is because they make it too easy. Read More

Thumbnail Image

Cybersecurity threats that keep the banks up at night

People are often asking financial services firms what is keeping them up at night, and fraud and cyber security increasingly top the list, but what are the specific threats they have to contend with? Read More

White Paper: Data Foundry

7 Reasons Why Fortune 5 Companies Utilize Colocation

If building and operating enterprise data centers was always the best course of action, all the companies that had the cash flow to do so would do it. There are several reasons Fortune 5 companies continue to engage colocation providers rather than exclusively running their own data centers. Read More

Top 5 Stories

1. Stealthy Mac malware spies on encrypted browser traffic
2. Report: Top 25 IT security products
3. There's now a tool to test for NSA spyware
4. No, Netflix is not a victim of Ransomware
5. Medical devices that could put you at security risk

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.