CSO Continuity & Recovery |
| |
|
What is risk management? Anytime you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. Traditional approaches and controls are no longer good enough. Caroline Wong, vice president of security strategy at Cobalt, provides a few tips for managing risk in today’s modern business environment. Read More ▶ |
|
| Video/Webcast: Neustar Inc Ransomware. Politically-motivated hacking. Distributed denial-of-service - and now mega-DDoS attacks targeting the foundations of the Internet, thanks to vulnerabilities in the burgeoning Internet of Things. 2016 has been a landmark year for information security in many ways. What can we expect in 2017? Read More ▶ | Satellite worksites can cause big headaches for tech pros tasked with keeping company assets secure. We talked to a number of tech pros to find out more about the dangers—and the solutions. Read More ▶ |
| Anti-virus software is getting worse at detecting both known and new threats, says a new report. Average detection rates for known malware went down a couple of percentage points slightly from 2015 to 2016, while detection rates for zero-days dropped in a big way. Read More ▶ |
| | There are times when an organization will be especially vulnerable if they don’t have real-time detection capabilities, and in preparation for these events it’s a good idea to reevaluate tools and strategies. Mike Paquette, director of products, Security Market at Elastic, identifies some of the most common events that can leave an organization vulnerable, and offers advice to successfully navigating them. Read More ▶ |
| Admins can choose from a bevy of secondary scanners and specialized tools to clean up infected or infested PCs. Read More ▶ |
| Remote workers who use their home office as their primary office are arguably at even more of a risk since they may be exposing corporate assets as well as personal assets. Untangle recommends the following best practices to secure your home network. Read More ▶ |
| Data storage experts share their advice regarding the best ways for small and midsized businesses to protect electronic information. Read More ▶ |
| White Paper: Neustar Inc For cybersecurity professionals, 2016 presented a year of distributed denial of service (DDoS) attacks that were unprecedented. Week after week, the public was inundated with news of hacks, attacks, and data leaks. It didn't take long for everybody to realize the old axiom of cybersecurity still holds true - there are two types of companies: those who are hacked and know about it, and those who are hacked and soon will find out. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|