June 2016: The month in hacks and breaches

Email not displaying correctly? View it in your browser.

CSO

CSO Security Leader

Jul 01, 2016
Featured Image

Conversations business leaders need to have about security

Cybersecurity is one of the biggest threats to businesses today, yet business leaders are still having the wrong conversations about it. It's time to change the conversations from tactical to strategic and technology to threats and risks. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

June 2016: The month in hacks and breaches
A pen test a day keeps hackers away
11 ways to fight off ransomware
Why CIOs should care about click fraud
How to use critical security controls to prioritize action
Are hospital security standards putting patient safety at risk?

White Paper: IBM Corporation

Addressing NIST and DOD Requirements for Mobile Device Management (MDM)

Essential capabilities for secure mobility. In this white paper we will look at NIST and DISA efforts to articulate requirements for Mobile Device Management. Read More

Thumbnail Image
INSIDER

June 2016: The month in hacks and breaches

Here's how the summer is heating up for hackers. Read More

Thumbnail Image

A pen test a day keeps hackers away

Penetration testing has evolved from a nice to have test to a mandatory test, Besides compliance a PEN test will tell you just how secure your organizations data really is. Your network is being scanned and attacked daily, don't wait to be the next breach headline. Get that PEN test now and learn just how easily an ethical hacker can gain access to your organizations data. Read More

Thumbnail Image

11 ways to fight off ransomware

These tips will help keep your PC safe from malware. Read More

Thumbnail Image

Why CIOs should care about click fraud

Click fraud is more than just a marketing problem. It presents a real security risk to your organization, experts say. CIOs need to know their enemy. Read More

How to use critical security controls to prioritize action

Tony Sager of the Center for Internet Security shares insights on how successful security leaders use the critical controls to set priorities and guide action across the organization Read More

Thumbnail Image

Are hospital security standards putting patient safety at risk?

Ted Harrington from Independent Security Evaluators joins CSO to discuss how hospitals are more vulnerable in protecting patient health than patient data. Read More

Video/Webcast: KnowBe4

Are You Protected Against the Weakest Link in Network Security?

The bad guys are just one gullible user click away from staging an all-out invasion. Watch this 2-minute video and learn how you can keep your users on their toes with security top of mind. Read More

Top 5 Stories

1. Researchers steal data from a PC by controllng the noise from the fans
2. 11 ways to fight off ransomware
3. Broken Phishing scam targets several tech journalists
4. The quickest way to annoy a privacy pro
5. Hard Rock Las Vegas suffers a second data breach

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Security Leader as [email protected].

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to [email protected].