Data breaches often result in CEO firing

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Mar 08, 2016
Featured Image

Apple shuts down first-ever ransomware attack against Mac users

With the help of security researchers, Apple over the weekend quickly blocked a cyberattack aimed at infecting Mac users with file-encrypting malware known as ransomware. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Data breaches often result in CEO firing
Surprising tips from a super-hacker
Is mobile the new squirrel?
CISOs must quickly adapt to any situation
Verizon Wireless settles FCC complaint about supercookie tracking
Abuse runs rampant on new generic top level domains

Video/Webcast: Veeam Software

18 Things NOT to do with your VM Backups

There are best practice lists for areas of the modern data center, but do you know what NOT to do to ensure the highest levels of availability? Attend this webinar from Veeam with expert Rick Vanover to learn more. Read More

Thumbnail Image

Data breaches often result in CEO firing

We will explore the issues of reputational damage, incident cost, stock price impact, and increased regulatory attention. We will also discuss the fate of four CEOs who have faced cybersecurity breaches in the past three years. Read More

Thumbnail Image

Surprising tips from a super-hacker

Virtually everyone in technology knows about Kevin Mitnick, the one-time fugitive hacker who is now a security consultant. Mitnick has a wealth of security advice for the public. Read More

Thumbnail Image

Is mobile the new squirrel?

Putting mobile into ‘perspective’ with other areas of security Read More

Thumbnail Image

CISOs must quickly adapt to any situation

Today’s CISO is in the unique position of becoming an important conduit between the C-Suite and the operators that keep an organization running. The position is a pivotal spoke in a large wheel having visibility and influence in activities that range from tactical to strategic; that involve personnel as well as technologies; and create policy as well as ensure compliance. In the face of so many challenges, the CISO’s greatest asset is the adaptability to not only juggle so many diverse projects but also help prioritize them in a way that makes the most sense from the business perspective. Read More

Thumbnail Image

Verizon Wireless settles FCC complaint about supercookie tracking

Verizon Wireless, in a settlement over its use of so-called supercookies to track mobile customers, will notify them about its targeted advertising practices and will obtain their permission before sharing personal identifiers with third parties. Read More

Thumbnail Image

Abuse runs rampant on new generic top level domains

Generic top-level domains (TLDs) that have sprung up in recent years have become a magnet for cybercriminals, to the point where some of them host more malicious domains than legitimate ones. Read More

White Paper: BlueWolf

2015-2016 The State of Salesforce

The State of Salesforce is Bluewolf's annual report of how the best companies use Salesforce. With data collected from over 1,500 Salesforce customers, this year's report uncovers trends and opportunities specific to each Salesforce cloud. Read More

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as [email protected].

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to [email protected].