Monday, 1 January 2018

5 mobile security threats you should take seriously in 2018

12 famous (and infamous) IT security disasters

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Jan 01, 2018
Featured Image

5 mobile security threats you should take seriously in 2018

Mobile malware isn't the most pressing threat. The more realistic mobile security hazards lie in some easily overlooked areas, all of which are only expected to become more pressing in the coming year. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

12 famous (and infamous) IT security disasters
Data breached in translation
Why SSL/TLS attacks are on the rise
Separation of duties and IT security
Is your data being sold on the dark web?

White Paper: Salesforce.com

Anatomy of a Mobile App: 8 Steps to Building Great Mobile Apps

What is your organization's approach to mobile? Are your teams effectively addressing all 8 key steps to building a mobile app? This primer takes you through the basics of every mobile app to help execute your mobile strategy. Read More

Thumbnail Image

12 famous (and infamous) IT security disasters

Arrogance and excessive pride may be the deadly sins of IT security Read More

Thumbnail Image
INSIDER

Data breached in translation

Online language translation software caused a data leak at Statoil. Use these best practices to keep translated information secure. Read More

Thumbnail Image

Why SSL/TLS attacks are on the rise

As more companies adopt better encryption practices, cyber criminals are turning to SSL/TLS vulnerabilities to deliver malicious attacks. Read More

Thumbnail Image
INSIDER

Separation of duties and IT security

Muddied responsibilities create unwanted risk and conflicts of interest. New regulations such as GDPR now require that you pay more attention to roles and duties on your security team. Read More

Thumbnail Image
INSIDER

Is your data being sold on the dark web?

Monitoring the dark web to see if your data is being sold there is risky, but solutions and services are available to help. Read More

White Paper: Salesforce.com

HBR Custom Thought Leadership Content -- Closing the Customer Experience Gap

There is broad agreement in the executive and management ranks that customer experience is a key competitive differentiator today. Companies of all sizes and across all industries see the strategic significance of superior customer experience expanding in the future. Read More

CSO Insider

1. 6 missteps that could cost CISOs their jobs
2. How hackers crack passwords and why you can't stop them
3. 11 top tools to assess, implement, and maintain GDPR compliance
4. 5 reasons to take a fresh look at your security policy
5. Six entry-level cybersecurity job seeker failings

Editor's Picks

1. Security platform or best of breed? There's only one answer
2. The truth about RFID credit card fraud
3. Best security software, 2017: How cutting-edge products fare against the latest threats
4. 5 mobile security threats you should take seriously in 2018
5. Hacking bitcoin and blockchain
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as oraclepedia@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2018 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.