Review: GreatHorn detects the most carefully planned email attacks

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Dec 11, 2017
Featured Image

The buck stops here: 8 security breaches that got someone fired

Some deserved the blame, and some seemed to just be at the wrong place at the wrong time. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Review: GreatHorn detects the most carefully planned email attacks
Is source code inspection a security risk? Maybe not, experts say
Over 1 million monthly spam emails spreading new Adwind RAT variants
The best kept secret in cybersecurity is protecting U.S. banks against catastrophic attacks
What is phishing? How this cyber attack works and how to prevent it

eGuide: RSA

Guide to Identity Management

The increasing number of devices taking their place in the "Internet of Things" (IoT) will have a corresponding effect on how companies employ their identity management structures. This eGuide introduces the concept of the "Internet of Identities" and explores how it will affect IAM in the very near future. Read More

Thumbnail Image
INSIDER

Review: GreatHorn detects the most carefully planned email attacks

Its ability to unmask phishing and social engineering attacks based on context truly sets it apart. Read More

Thumbnail Image

Is source code inspection a security risk? Maybe not, experts say

Some information security insiders raised a red flag when Russian requests to review security software code became known. The controversy may be a tempest in a teapot. Read More

Thumbnail Image

Over 1 million monthly spam emails spreading new Adwind RAT variants

The newly repackaged Adwind remote access Trojan can monitor user activity, log keystrokes, take screenshots, download malicious files, and record video and audio. Read More

Thumbnail Image

The best kept secret in cybersecurity is protecting U.S. banks against catastrophic attacks

The Sheltered Harbor cybersecurity initiative for U.S. banks and financial services firms protects against hacker attacks. Read More

Thumbnail Image

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack. Read More

White Paper: CyberArk

Privileged Account Security Solutions: A Competitive Review

In many ways, privileged accounts represent the most valuable information that cyberattackers can access. Read More

CSO Insider

1. What are the GDPR requirements?
2. How vArmour restores the security perimeter
3. Separation of duties and IT security
4. How XebiaLabs brings order and efficiency to DevOps projects
5. Sqrrl ferrets out network traffic anomalies to find hidden threats

Editor's Picks

1. The 10 best antivirus tools for Android
2. 12 signs you've been hacked -- and how to fight back
3. How to detect malware infection in 9 easy steps
4. Top 5 cybersecurity facts, figures and statistics for 2017
5. The 10 Windows group policy settings you need to get right

Is your company a great place to work in IT?
Computerworld’s annual listing of Best Places to Work in IT showcases the organizations that excel at keeping their employees engaged and loyal with compensation, training and access to hot technologies.
Submit your nomination today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.