How to respond to a cyber attack

Email not displaying correctly? View it in your browser.

CSO

CSO TechWatch

Mar 07, 2017
Featured Image
INSIDER

What should an insider risk policy cover?

To protect from liability concerns, enterprises need something in writing so that everyone knows what to do upon finding an insider threat. Here are some suggestions from security experts. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to respond to a cyber attack
Are Virtual CISOs the answer to your security problems?
How to protect sensitive data and limit risk of data exposure or leaks?
Who should be on an insider risk team?
Here’s a new way to prevent cyberattacks on home devices
How to get your infrastructure in shape to shake off scriptable attacks

White Paper: Dell Inc

A Practical Guide for Evaluating the Value of VCE Converged Infrastructure for Data Center Modernization

This study provides insight on various types of clouds and how they are used today along with a practical framework to evaluate converged infrastructure versus do-it-yourself approaches. Based on interviews with organizations that implemented VCE solutions, Forrester quantified how VCE converged infrastructure drove significant increases in IT efficiency and productivity, as well as decreases in the cost associated with infrastructure. Read More

Thumbnail Image

How to respond to a cyber attack

Following a breach, organizations should focus on mitigating damage and data loss and providing information to law enforcement. Partner at Ballard Spahr, LLP and former Assistant U.S. Attorney Ed McAndrew and Guidance Software President and CEO Patrick Dennis have compiled best practices for preparing and responding to a cyber-attack and working with law enforcement. Read More

Thumbnail Image
INSIDER

Are Virtual CISOs the answer to your security problems?

Virtual CISOs can be an invaluable resource for companies with limited resources. But are they a short-term fix to a long-term problem? Read More

Thumbnail Image

How to protect sensitive data and limit risk of data exposure or leaks?

The average cost per record is $158 whereas the cost per record breached ranges from $355 to $129 for healthcare and retail industry respectively. Despite the high risk of the threat, enterprises continue to fall victim to data breaches globally and it raises a significant concern over protecting the data organizations own, process and store. Read More

Thumbnail Image

Who should be on an insider risk team?

Catching an insider taking confidential information doesn't happen by chance, and policies and procedures must be in place to know what to do when an insider is caught. Read More

Thumbnail Image

Here’s a new way to prevent cyberattacks on home devices

Homeowners worried about cybersecurity attacks on IP-connected devices like lights, baby monitors, home security systems and cameras, will soon be able to take advantage of a $200 network monitoring device called Dojo. Read More

Thumbnail Image

How to get your infrastructure in shape to shake off scriptable attacks

According to F-Secure’s The State of Cyber Security 2017 report, criminal hackers perform most cyber-attacks using basic, scriptable techniques against poorly maintained infrastructure. This will continue as long as there are loads of attack scripts and plenty of poorly secured networks. Read More

White Paper: Google

Gartner Top 10 Strategic Technology Trends for 2016: At a Glance

From wearable devices to virtual personal assistants, Gartner highlights new technology trends that will disrupt the workplace as we know it. Find out how forward-thinking IT leaders can take advantage of today's most powerful tools, such as cloud-based services, interconnected devices and adaptive security architectures. Read More

Top 5 Stories

1. Spammers expose their entire operation through bad backups
2. The 10 essential Reddits for security pros
3. Infosec mourns over Howard Schmidt, who helped make the country a safer place
4. Fileless Powershell malware uses DNS as covert communication channel
5. 6 dangerous toys that are not child's play

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO TechWatch as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.