Mitigating insider threats - a technical perspective

Email not displaying correctly? View it in your browser.

CSO

CSO Security Awareness Weekly

Jul 11, 2016
Featured Image

What I learned playing prey to Windows scammers

Three months of phone calls prove Windows scammers are more skilled at social engineering than you think Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Mitigating insider threats - a technical perspective
How to avoid being the next hospital breach
Phishing scam focuses on the basics to harvest business credentials

White Paper: CDW Corporation

Achieving Prolific Productivity with SAAS

Since its debut in the early 2000s, Software as a Service (SaaS) has spread horizontally, moving across departments and lines of business, and vertically, being adopted by the largest enterprise down to the smallest organization. Read More

Thumbnail Image

Mitigating insider threats - a technical perspective

Security practitioners must always think dynamically when it comes to trying to develop solutions to counter this threat. Implementing technology solutions at different levels and overlapping functions will best cast a tight-weave security net to catch suspicious behavior prior to a major security incident. Read More

Thumbnail Image

How to avoid being the next hospital breach

Mass General Hospital's announcement that Social Security numbers and date of births of 4,300 patients had been compromised serves as a reminder that the healthcare industry remains a prime target. Read More

Thumbnail Image

Phishing scam focuses on the basics to harvest business credentials

Criminals are using basic CSS and HTML to scam victims out of their credentials, and in some cases, their phone numbers too. The Phishing campaign is driven by an easily customized kit that uses blurred images as a lure. Read More

Case Study: CDW Corporation

Footwear Company Steps Up To Office 365

For the past two years, Donald J Pliner CIO Jeff Moss has been planning an IT infrastructure upgrade for the designer footwear and accessory company. Read More

Top 5 Stories

1. What I learned playing prey to Windows scammers
2. Court decision raises issues about sharing passwords
3. Apple devices held for ransom, rumors claim 40M iCloud accounts hacked
4. What security pros can learn from the networking team
5. Google fixes over 100 flaws in Android, many in chips

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Security Awareness Weekly as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.