How to spot and prevent insider threats

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Jun 29, 2017
Featured Image

The fault for ransomware attacks lies with the challenges security teams face

The realities of managing and protecting IT infrastructures puts IT and security personnel in a no-win situation when attacks like WannaCry or ExPetr occur, so stop blaming them. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to spot and prevent insider threats
The CSO guide to top security conferences
NotPetya ransomware hits hospitals, while Shadow Brokers touts its July VIP service
Security leaders need to focus on minimum effort, not minimum compliance
PETYA – Darwinism applied to cyberspace

White Paper: Safebreach

A New Methodology For Quantifying Risks

An invaluable technique for understanding security risks is to assess your environment. But, vulnerability assessments provide limited context, while penetration testing's point-in-time approach renders findings that are quickly out-of-date. A better approach is dynamic security assessment, as defined by Securosis analyst Mike Rothman. Read More

Thumbnail Image

How to spot and prevent insider threats

Are departing employees taking data with them? Here’s what you need to know to better protect your enterprise network and proprietary information from insider threats. Read More

Thumbnail Image

The CSO guide to top security conferences

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. Read More

Thumbnail Image

NotPetya ransomware hits hospitals, while Shadow Brokers touts its July VIP service

U.S. hospitals were hit by the NotPetya ransomware—despite a vaccine already being available—while the Shadow Brokers touts its July dump of the month and its VIP service. Read More

Thumbnail Image

Security leaders need to focus on minimum effort, not minimum compliance

Experian's Michael Bruemmer takes a Security Slap Shot on the need to harness regulations to drive better security and not just minimum compliance. Read More

Thumbnail Image

PETYA – Darwinism applied to cyberspace

PETYA ransomware struck on 27 June. The cure was released in April. Why did anyone get infected? Read More

Video/Webcast: Flexera Software

An Introduction to Open Source Licensing: A Legal Perspective

Flexera Software guest presenter Andrew Hall, attorney, as he shares his experience and guidance for using open source, and best practices for managing security and legal risks. Andre discusses open source licensing fundamentals, risks & benefits, obligations & restrictions, and much more. Read More

CSO Insider

1. Tested: How 4 deception tools deliver truer network security
2. What it takes to be a malware analyst
3. Target's data breach settlement sets a low bar for industry security standards
4. How Cisco combats fast-maturing cybercrime networks
5. 6 reasons chip hacks will become more popular

Editor's Picks

1. Top 5 cybersecurity facts, figures and statistics for 2017
2. CEO lies, commits fraud, and yes, the startup craters
3. Cybersecurity spend: ROI Is the wrong metric
4. Microsoft's emergency patch is no excuse to hang on to XP, Windows Server 2003
5. With new dynamic capabilities, will whitelisting finally catch on?
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.