CSO Security Awareness Weekly |
| |
|
Machine learning technologies can help companies spot suspicious user behaviors, malicious software, and fraudulent purchases -- but even as the defensive technologies are getting better, attackers are finding ways to get around them Read More ▶ |
|
| Virtual Event: WGroup As more IT services and applications are outsourced to third-party vendors, it becomes increasingly important for companies to understand how to effectively manage vendors and conduct governance meetings at predefined intervals. This allows organizations to take full advantage of IT-vendor relationships by providing the opportunity to strategize, review, align goals, and hold vendors accountable for their performance. Read More ▶ | As 2016 comes to a close, there are a few types of security advice we should strive to avoid. With all the inevitable confusion about effective ways of protecting our data and machines, security experts need to make sure the information we're giving is both clear and current. Read More ▶ |
| You take great pains to come up with a strong password when registering for an account on a website -- only to see your efforts go for naught when that site gets hacked. Several sites had their databases of user accounts not only breached but stolen this year, which include the necessary information for logins (i.e. username, password). The following sites are ranked starting at the fewest number of user accounts with passwords that were taken. Read More ▶ |
| | Executives are some of the biggest targets- and sometimes the easiest prey - for spear phishing criminals. Here are tips for how security managers can go beyond awareness training to keep the top-level out of danger Read More ▶ |
| Research/Infographic: Bay Dynamics Security Operations Centers are inundated with countless threat alerts from their various security tools. Incident responders sift through the pile, hoping they chase down the imminent ones, only to find out later that they wasted their time. White they were investigating what they thought was a high severity alerts, was in fact low in severity, leaving the true threat untouched and able to attack the organization. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|