It’s time to get off the treadmill: Why you should understand adversary playbooks

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Sep 10, 2018
Featured Image

Why data loss prevention is a throwback technology

Times are changing, and traditional cybersecurity tools are no longer enough to protect an organization’s assets. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

It’s time to get off the treadmill: Why you should understand adversary playbooks
Why monday.com Is The Universal Team Management Tool for Your Team
The hidden security problem we all need to know about
In the new ecommerce fraud landscape, every vertical is now at risk
The ethics of creating secure software
What is the cost of a data breach?

White Paper: Hitachi ID Systems, Inc.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More

Thumbnail Image

It’s time to get off the treadmill: Why you should understand adversary playbooks

Flipping the equation on known adversaries by developing and deploying controls at locations on the intrusion kill chain designed specifically for these known playbooks will increase a company’s ability to block an attack. The cybersecurity industry must collaborate to identify all know adversary playbooks and share this knowledge with each other and the public. Read More

Thumbnail Image
DealPost

Why monday.com Is The Universal Team Management Tool for Your Team

This platform is perfect for teams sized at 2 to 200 — and gives every employee the same level of transparency. Read More

Thumbnail Image

The hidden security problem we all need to know about

If you can anticipate how employees will work, you’ll have a better shot of preemptively preparing for it and protecting your critical data. Read More

Thumbnail Image

In the new ecommerce fraud landscape, every vertical is now at risk

Fraudsters are not just targeting small merchants or inexpensive items anymore – virtually any vertical or product can be a worthwhile target for online fraud, and the losses could cause irreversible damage to a retailer’s bottom line. Every online retailer needs to know if they are at risk, what that risk means, and ways that they can minimize their vulnerability right now. Read More

Thumbnail Image

The ethics of creating secure software

The permeation of software into every aspect of our lives makes it impossible to avoid. Software has transcended from a technical process into the realm of social morality. Therefore, the consequences are on a massive scale across the whole of society. Security of that software is not a technical question, but a moral one, and companies need to treat it that way. Read More

Thumbnail Image

What is the cost of a data breach?

These are the factors that determine the cost of a breach, along with advice for minimizing their impact. Read More

White Paper: Bronze Drum Consulting

How Powerful New Technologies are Powering a Real-Time Revolution in Capital Markets

Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More

Editor’s Picks

1. Patching Windows for Spectre and Meltdown: A complete guide
2. How do you secure the cloud? New data points a way
3. Keeping pace with security automation
4. 3 reasons companies fail to assess the scope of a data breach
5. Mastering email security with DMARC, SPF and DKIM
6. Preparing for the day quantum computing cracks public-key cryptography: What to do now
7. Corporate pre-crime: The ethics of using AI to identify future insider threats
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.