Laden...
June 09, 2019
Cybercriminal group Carbanak has stolen hundreds of millions of dollars from financial institutions. Here's a detailed analysis by Bitdefender of an attack on one bank. Read more â¶
How do you secure the cloud? New data points a way
Rising to the cloud security challenge
Why unauthenticated SMS is a security risk
How to evaluate SOC-as-a-service providers
12 tips for effectively presenting cybersecurity to the board
New CISO appointments, May 2019
Do you know what criteria you should consider when evaluating which SOAR platform to choose? This SOAR Buyer's Guide will help you. Read more â¶
New reports show big differences in risk among public, private and hybrid cloud deployments. Hereâs advice on the tools, information and organizational structure needed to execute a successful cloud security strategy. Read more â¶
DEALPOST
Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more â¶
For many businesses, the fresh security risks posed by the rapid adoption of cloud technologies are driving deep security changes. For others, the cloud isn't the reason for the security overhaul but the fundamental enabler of it. Download this FREE digital issue of CSO magazine to learn more. Read more â¶
Multifactor authentication that uses SMS messaging as a second factor is vulnerable to simple hacks. User education is the best defense. Read more â¶
Not every organization that needs a security operations center can afford to equip and staff one. A number of providers provide SOC as a service. Here's what you need to know about them. Read more â¶
Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more â¶
Find up-to-date news of CSO, CISO and other senior security executive appointments. Read more â¶
Chances are you are considering local internet breakouts with SD-WAN. But without security purpose-built for the task, the local breakouts break downâcreating vulnerabilities. Zscaler can help. Read more â¶
© 2024