In truth, your security team has a lot to learn from the networking team about how to keep the whole organization running smoothly. We spoke to networking experts to find out what they most wanted security pros to know. Read More ▶ |
|
| White Paper: Imperva Read the new 2016 Cyberthreat Defense Report and find out how 1000 IT security decision makers defend against today's internal and external threats. Read More ▶ | Here's how the summer is heating up for hackers. Read More ▶ |
| Welcome to the weekly recap of news and other interesting items. This week's installment of Rehashed kicks off the month of July, and will be the start of a long weekend for many of us here in the U.S. Today we’re talking about Brexit, Ransomware, Phishing, botnets, stolen medical records, and more. Read More ▶ |
| Ted Harrington from Independent Security Evaluators joins CSO to discuss how hospitals are more vulnerable in protecting patient health than patient data. Read More ▶ |
| | LizardStresser, the DDoS malware for Linux systems written by the infamous Lizard Squad attacker group, was used over the past year to create over 100 botnets, some built almost exclusively from compromised internet-of-things devices. Read More ▶ |
| The U.S. Congress has a small window of time to stop proposed changes in federal court rules that will expand the FBI's authority to hack into computers during criminal investigations, a senator said Thursday. Read More ▶ |
| These tips will help keep your PC safe from malware. Read More ▶ |
| eBook: Sqrrl Cyber threat hunting is the proactive, iterative search for advanced cyber threats that have evaded your other defenses. In this ebook you will learn about threat hunting benefits, frameworks, and best practices. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|