www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-16T08:37:48+00:00 www.secnews.physaphae.fr CSO - CSO Daily Dashboard IDG Contributor Network: The router of all evil recently became the target of a Russian malware campaign using what is known as “VPNfilter” malware.]]> 2018-07-19T11:16:00+00:00 https://www.csoonline.com/article/3290292/network-router/the-router-of-all-evil.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=747607 False Malware VPNFilter None CSO - CSO Daily Dashboard BrandPost: The Value of Third Party Testing 2018-07-19T06:00:00+00:00 https://www.csoonline.com/article/3290389/security/the-value-of-third-party-testing.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=747608 False Malware None None CSO - CSO Daily Dashboard IDG Contributor Network: Hack like a CISO 2018-07-19T04:00:00+00:00 https://www.csoonline.com/article/3291280/leadership-management/hack-like-a-ciso.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=747609 False Hack None None CSO - CSO Daily Dashboard Review: Predictively locking down security with Balbix 2018-07-19T02:58:00+00:00 https://www.csoonline.com/article/3289270/network-security/review-predictively-locking-down-security-with-balbix.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=747610 False Vulnerability None None CSO - CSO Daily Dashboard IDG Contributor Network: Are network-based security detection tools going dark? 2018-07-18T12:25:00+00:00 https://www.csoonline.com/article/3290475/network-security/are-network-based-security-detection-tools-going-dark.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=747611 False Threat None None CSO - CSO Daily Dashboard IDG Contributor Network: N-dimensional behavioral biometrics: a viable solution for digital fraud? Javelin Research Center reported a record 16.7 million consumers fell victim last year, in large part due to the massive Equifax breach which left millions of consumers' data exposed to would-be hackers. Now, hackers are using exposed credit and debit card numbers to steal from bank and loyalty accounts, shifting to digital attacks without ever needing a physical card in their hands. According to Javelin, card-not-present fraud (CNP) is 81 percent more likely than point-of-sale fraud (PoS). In 2017, more consumers had their cards misused in a CNP transaction than at the cash register.]]> 2018-07-18T04:30:00+00:00 https://www.csoonline.com/article/3290937/biometrics/n-dimensional-behavioral-biometrics-a-viable-solution-for-digital-fraud.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=747612 False None Equifax None CSO - CSO Daily Dashboard IDG Contributor Network: 8 steps to secure unmanaged devices in the enterprise security blind spot is ripe for exploitation by cybercriminals probing your network for weaknesses. Despite 97 percent of risk professionals admitting that a data breach or cyber-attack caused by unsecure IoT devices could be catastrophic for their organization, according to a survey by the Ponemon Institute and Shared Assessments, just 15 percent have an inventory of most of their IoT and only 46 percent have a policy in place to disable devices that pose a risk.]]> 2018-07-17T08:33:00+00:00 https://www.csoonline.com/article/3290425/internet-of-things/8-steps-to-secure-unmanaged-devices-in-the-enterprise.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=747613 False Data Breach None None CSO - CSO Daily Dashboard IDG Contributor Network: Redefining threat prediction 2018-07-16T09:05:00+00:00 https://www.csoonline.com/article/3290241/analytics/the-new-definition-for-threat-prediction.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=747614 False Threat None None CSO - CSO Daily Dashboard IDG Contributor Network: HTML5: a devil in disguise 2018-07-16T08:45:00+00:00 https://www.csoonline.com/article/3290420/malware/html5-a-devil-in-disguise.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=747615 False Malware None None CSO - CSO Daily Dashboard 5 ways to hack blockchain in the enterprise 2018-07-16T02:58:00+00:00 https://www.csoonline.com/article/3289328/blockchain/5-ways-to-hack-blockchain-in-the-enterprise.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=747616 False Hack None None CSO - CSO Daily Dashboard Concerned about smart TVs invading privacy, lawmakers ask FTC to investigate Zero-day vulnerabilities in Samsung Smart TVs were exposed at the end of 2012; if exploited, attackers could gain control of the webcam and microphone. Smart TVs were called the perfect target for spying on users back in 2013 – the same year as a Black Hat presentation about hacking Samsung Smart TVs. It was not just exploits that allowed for spying as a scandal erupted about LG Smart TV spying in 2013.]]> 2018-07-15T09:57:00+00:00 https://www.csoonline.com/article/3290277/privacy/concerned-about-smart-tvs-invading-privacy-lawmakers-ask-ftc-to-investigate.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=747256 False None None None CSO - CSO Daily Dashboard IDG Contributor Network: Stop training your employees to fall for phishing attacks 2018-07-10T11:46:00+00:00 https://www.csoonline.com/article/3287655/phishing/stop-training-your-employees-to-fall-for-phishing-attacks.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=739060 False None None None CSO - CSO Daily Dashboard IDG Contributor Network: 10 ways to prevent, detect and recover from ransomware and zeroday threats ransomware has evolved, spread and grown rapidly more sophisticated in response to our efforts to defend against it.There have been some high-profile ransomware attacks in the last few years, as part of a growing tide of threats. Ransomware volumes increased by 350% in 2017 alone, according to a recent NTT Security report. Security professionals tasked with safeguarding company data must have ransomware on their radars and it's crucial to take steps to mitigate the threat.]]> 2018-07-10T08:24:00+00:00 https://www.csoonline.com/article/3287099/ransomware/10-ways-to-prevent-detect-and-recover-from-ransomware-and-zeroday-threats.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=738824 False Ransomware,Malware None None CSO - CSO Daily Dashboard Duty of care: Why (and how) law firms should up their security game led to calls to regulate the legal profession, and today ethics is a mandatory part of law school training and bar association rules of conduct. [ How much does a data breach cost? Here's where the money goes. | Get the latest from CSO by signing up for our newsletters. ]]]> 2018-07-10T03:00:00+00:00 https://www.csoonline.com/article/3287864/legal/duty-of-care-why-and-how-law-firms-should-up-their-security-game.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=738383 False Data Breach None None CSO - CSO Daily Dashboard Thieves hack Marathon gas station, steal $1,800 of gas 2018-07-09T07:55:00+00:00 https://www.csoonline.com/article/3287650/security/thieves-hack-marathon-gas-station-steal-1800-of-gas.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=737374 False Hack None None CSO - CSO Daily Dashboard No data breach at Patreon, but proactive notice caused some concern The Patreon letter recaps the Typeform data breach, and then informs the recipient that "as a result, we are reaching out to you as the data that was potentially impacted includes your [name and email address]."]]> 2018-07-02T18:55:00+00:00 https://www.csoonline.com/article/3286625/security/no-data-breach-at-patreon-but-proactive-notice-caused-some-concern.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=731095 False Data Breach None None CSO - CSO Daily Dashboard IDG Contributor Network: The great identity re-architecture: enabling trust and interoperable credentials Andreessen Horowitz launched a $300M crypto fund aimed at fueling innovation in blockchain solutions and while the fund only addresses use cases for blockchain, of which Identity Management is a subset, the goal is to solve a problem every organization today is struggling with – how to build trust in a world where every business runs on software?Businesses written in software are more customer-centric, service-oriented and interconnected but, to inspire trust, identity architects will have to address new requirements including the growing sprawl of identity data, the ever-increasing mass of dormant and disposable online accounts that create points of attack for credential theft.]]> 2018-07-02T09:50:00+00:00 https://www.csoonline.com/article/3285659/identity-management/the-great-identity-re-architecture-enabling-trust-and-interoperable-credentials.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=731096 False None None None CSO - CSO Daily Dashboard BrandPost: Building an Adaptive and Secure SD-WAN Framework to Support Digital Transformation new requirements, customers are building next-gen offices that utilize cloud-based applications, global collaboration through video and audio teleconferencing, and highly scalable bandwidth. At the same time, they need to protect the enterprise from new attacks targeting this expanding attack surface.]]> 2018-07-02T06:00:00+00:00 https://www.csoonline.com/article/3285979/security/building-an-adaptive-and-secure-sd-wan-framework-to-support-digital-transformation.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=731097 False None None None CSO - CSO Daily Dashboard Privacy breach: Home security camera footage sent to wrong person asked Swann, “Do you understand this is really serious breach of privacy?”]]> 2018-07-01T08:17:00+00:00 https://www.csoonline.com/article/3286189/security/privacy-breach-home-security-camera-footage-sent-to-wrong-person.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=731098 False None None None CSO - CSO Daily Dashboard BrandPost: 3 Musts for VPN Multi-Factor Authentication 81 percent of hacking-related data breaches involve weak or stolen passwords.]]> 2018-06-29T08:50:00+00:00 https://www.csoonline.com/article/3286207/identity-management/3-musts-for-vpn-multi-factor-authentication.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=728927 False Data Breach None None CSO - CSO Daily Dashboard Best Android antivirus? The top 12 tools May 2018 evaluations of 20 Android security apps. (The AV-TEST Institute is a Germany-based independent service provider of IT security and antivirus research.) Each Android antivirus software app listed below received perfect protection and usability scores of 6.0. The apps are in alphabetical order. [ Learn how SandBlast Mobile simplifies mobile security. | Get the latest from CSO by signing up for our newsletters. ]]]> 2018-06-28T12:18:00+00:00 https://www.csoonline.com/article/3234769/mobile-security/best-android-antivirus-the-top-12-tools.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=727511 False None None None CSO - CSO Daily Dashboard Nearly half of companies worried about IoT have no way to detect attack on ICS, report 2018-06-27T08:34:00+00:00 https://www.csoonline.com/article/3284481/security/nearly-half-of-companies-worried-about-iot-have-no-way-to-detect-attack-on-ics-report.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=725622 False None None None CSO - CSO Daily Dashboard Reduce breach risk and costs with security resilience 4 deception tools deliver truer network security. | Get the latest from CSO by signing up for our newsletters. ]]]> 2018-06-27T06:14:00+00:00 https://www.csoonline.com/article/3284379/security/reduce-breach-risk-and-costs-with-security-resilience.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=725495 False None APT 17 None CSO - CSO Daily Dashboard 4 scams that illustrate the one-way authentication problem 11 ways to hack 2FA column a few weeks ago continues to be a popular discussion topic with readers. Most people are shocked about how easy it is to hack around two-factor (2FA) and multi-factor authentication (MFA). It isn't hard. Sometimes it's as easy as a regular phishing email. [ Learn about alternatives to the password. | Get the latest from CSO by signing up for our newsletters. ]]]> 2018-06-26T03:40:00+00:00 https://www.csoonline.com/article/3284409/fraud/4-scams-that-illustrate-the-one-way-authentication-problem.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=723556 False Hack None None CSO - CSO Daily Dashboard DDoS attacks on the rise; China and Russia behind most credential abuse attacks, report Summer 2018 State of the Internet / Security: Web Attack report; moving forward, the reports will be biannual as Akamai will release reports in summer and winter instead of quarterly. In this report, Akamai covered cyberattack trends from Nov. 2017 to April 2018.]]> 2018-06-26T03:30:00+00:00 https://www.csoonline.com/article/3284349/security/ddos-attacks-on-the-rise-china-and-russia-behind-most-credential-abuse-attacks-report.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=723557 False None None None CSO - CSO Daily Dashboard BrandPost: Rising Breach Rate Drives Businesses Toward Zero Trust Security Model a recent Forrester study found two-thirds of organizations experienced an average of five or more security breaches in the past two years.This disconnect means security is failing its basic mission, according to Tom Kemp, CEO of Centrify.]]> 2018-06-25T16:17:00+00:00 https://www.csoonline.com/article/3284411/security/rising-breach-rate-drives-businesses-toward-zero-trust-security-model.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=722923 False None None None CSO - CSO Daily Dashboard What is a zero-day exploit? A powerful but fragile weapon Take a look at the numbers.. | Get the latest from CSO by signing up for our newsletters. ]]]> 2018-06-25T03:00:00+00:00 https://www.csoonline.com/article/3284084/cyber-attacks-espionage/what-is-a-zero-day-exploit-a-powerful-but-fragile-weapon.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=721785 False None None None CSO - CSO Daily Dashboard Decade-old attack can pwn Google Home, Chromecast, Sonos and Roku over a decade, two different researchers started poking around in the attack vector and discovered that Roku streaming devices, Sonos wireless speakers, smart home thermostats, Google Home, and Chromecast were all vulnerable and can all be pwned via DNS rebinding attacks.First up is research from programmer Brannon Dorsey. Excited to finally share this research publicly!TL;DR Following the wrong link could allow remote attackers to control your WiFi router, Google Home, Roku, Sonos speakers, home thermostats and more 😲https://t.co/UgJbTalDeL]]> 2018-06-21T08:02:00+00:00 https://www.csoonline.com/article/3283249/security/decade-old-attack-can-pwn-google-home-chromecast-sonos-and-roku.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=715721 False None None None CSO - CSO Daily Dashboard IDG Contributor Network: What does GDPR mean for an organization\'s hybrid IT strategy? 2018-06-20T10:58:00+00:00 https://www.csoonline.com/article/3283334/it-strategy/what-does-gdpr-mean-for-an-organizations-hybrid-it-strategy.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=714138 False None None None CSO - CSO Daily Dashboard Does cyber insurance make us more (or less) secure? 7 common modeling mistakes | Get the latest from CSO by signing up for our newsletters. ] When a company like Equifax commits gross negligence for failing to secure our data, and a breach pumps 147.9 million records onto the internet, the company's directors keep their jobs, their cyber insurance policy pays out, and the company posts a profit.]]> 2018-06-18T03:00:00+00:00 https://www.csoonline.com/article/3280990/security/does-cyber-insurance-make-us-more-or-less-secure.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=710122 False None APT 32,Equifax None CSO - CSO Daily Dashboard Security executives on the move and in the news Michael Nadeau, senior editor.June 11, 2018: Matt Stamper named CISO and executive advisor at Evotek Stamper will guide digital enablement solutions provider Evotek's clients as they develop and mature their cybersecurity programs to address digital risks. Prior to joining Evotek, Stamper was a research director in Gartner's Security and Risk Management practice where he covered security program design, security incident response, security governance, privacy, breach and attack simulation, and security standards and frameworks. Earlier, Stamper was the CISO for U.S. operations and vice president of services at KIO Networks (formerly redIT), an international managed services provider.]]> 2018-06-14T06:50:00+00:00 https://www.csoonline.com/article/3204008/it-careers/security-executives-on-the-move-and-in-the-news.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=706109 False None None None CSO - CSO Daily Dashboard Cisco poised to become a cybersecurity force 2018-06-13T13:26:00+00:00 https://www.csoonline.com/article/3281454/security/cisco-poised-to-become-a-cybersecurity-force.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=706110 False None None None CSO - CSO Daily Dashboard IDG Contributor Network: Cyber games at the World Cup 2018 2018-06-11T06:02:00+00:00 https://www.csoonline.com/article/3280807/cyberwarfare/cyber-games-at-the-world-cup-2018.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=706111 False None None None CSO - CSO Daily Dashboard IDG Contributor Network: Third-party risk: it\'s the second hop you should fear 2018-06-07T09:49:00+00:00 https://www.csoonline.com/article/3280264/risk-management/third-party-risk-it-s-the-second-hop-you-should-fear.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=706112 False None None None CSO - CSO Daily Dashboard 35% off Pulse Solo Dimmable LED Light with Dual Channel Bluetooth Speakers - Deal Alert Pulse Solo is the world's first LED light with dual speakers in one bulb. Pulse Solo combines the energy efficiency of a dimmable LED light with the high-quality audio of JBL Bluetooth speakers. Setup is easy, twist the Pulse Solo into any standard light socket, and adjust both lighting and sound from any Bluetooth enabled iOS or Android device. Experience the soaring highs and the rich stereo sound of JBL combined with warm, dimmable lighting, without the fuss of speaker wires, power cords, or an independent remote control. The intuitive iOS and Android App offers seamless control of both light and sound while listening to your favorite streamed music or media, offering you the ability to customize your light and music to suit any mood. The Pulse Solo typically lists on Amazon for $59.99, but is currently discounted 35% to $38.93.   See this deal on Amazon .To read this article in full or to leave a comment, please click here]]> 2017-08-24T06:47:00+00:00 http://www.csoonline.com/article/3106867/consumer-electronics/32-off-pulse-solo-dimmable-led-light-with-dual-channel-bluetooth-speakers-deal-alert.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=400508 False None None None CSO - CSO Daily Dashboard Just $9.99 Right Now For a 3-Pack of 6-foot Lightning/Micro USB Combo Cables - Deal Alert discounted to $9.99. Features a durable stainless steel connector, and a tangle-free nylon braided cord. The company offers a 12-month warranty against any issues with quality, as well.  See this 3-pack deal on Amazon.To read this article in full or to leave a comment, please click here]]> 2017-08-22T06:28:00+00:00 http://www.csoonline.com/article/3218644/mobile/just-9-99-right-now-for-a-3-pack-of-6-foot-lightning-micro-usb-combo-cables-deal-alert.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=399547 False None None None CSO - CSO Daily Dashboard 45% off Vastar 4-in-1 USB Charging Cable Adapter With Micro, Mini USB and Lightning - Deal Alert charging cable from Vastar features micro and mini USB, 30-pin and lightning connectors, making it compatible with a very wide range of newer and older smartphones, tablets, USB devices and more. Equipped with a connector for iPhone 6/6 plus, 5/5s, iPad4, iPad Air, iPad mini, USB type C for Nexus 6P, Nexus 5X, Oneplus 2, 2015 MacBook with 12" Retina Display, 2015 Google Chromebook Pixel. Micro USB connector charge for most android phones, Bluetooth headset, external batteries; Mini USB connector for some additional mobile phone models, MP3, digital cameras or other devices. The list price on this cable has been reduced 45% to just $5.99. See it on Amazon.To read this article in full or to leave a comment, please click here]]> 2017-08-14T06:31:00+00:00 http://www.csoonline.com/article/3215906/mobile/45-off-vastar-4-in-1-usb-charging-cable-adapter-with-micro-mini-usb-and-lightning-deal-alert.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=396576 False None None None CSO - CSO Daily Dashboard Finance and government veteran Mark Morrison joins OCC as chief security officer OCC Mark Morrison, senior vice president and CSO, OCC  In this new position, Morrison will report to OCC's executive vice president and chief risk officer John Fennell. "To deliver world-class risk management, clearance and settlement services, we must ensure the confidentiality, availability, and integrity of our systems on behalf of market participants in our role as a Systemically Important Financial Market Utility," said Craig Donohue, OCC executive chairman and chief executive officer in a press release. "With over 35 years of experience in the field of information and cyber security, Mark brings a high level of expertise to our risk management team. His leadership will help OCC continue to integrate information security best practices into our service offerings, reduce systemic risks, and safeguard the integrity of the markets we clear."To read this article in full or to leave a comment, please click here]]> 2017-05-01T12:41:00+00:00 http://www.csoonline.com/article/3193275/leadership-management/finance-and-government-veteran-mark-morrison-joins-occ-as-chief-security-officer.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=360648 False Guideline None None CSO - CSO Daily Dashboard Three shades of hackers: The differences among the white, grey, and black hats Exigent Networks. As the infographic explains, there are some, well, grey areas between categories-for example, there is sometimes a fine line between grey hats and black hats.To read this article in full or to leave a comment, please click here]]> 2017-05-01T08:00:00+00:00 http://www.csoonline.com/article/3193222/hacktivism/three-shades-of-hackers-the-differences-among-the-white-grey-and-black-hats.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=360650 False None None None CSO - CSO Daily Dashboard Dan Geer: Cybersecurity is \'paramount national security risk\' To read this article in full or to leave a comment, please click here]]> 2017-05-01T04:21:00+00:00 http://www.csoonline.com/article/3193445/security/dan-geer-cybersecurity-is-paramount-national-security-risk.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=360520 False None None None CSO - CSO Daily Dashboard No, Netflix is not a victim of Ransomware To read this article in full or to leave a comment, please click here]]> 2017-05-01T04:00:00+00:00 http://www.csoonline.com/article/3193397/security/no-netflix-is-not-a-victim-of-ransomware.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=360521 False None None None CSO - CSO Daily Dashboard Believe your employer doesn\'t know about your legal problems? Think again To read this article in full or to leave a comment, please click here]]> 2017-05-01T03:25:00+00:00 http://www.csoonline.com/article/3191345/it-careers/don-t-do-the-crime-if-you-can-t-do-the-time-at-work.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=360522 False None None None CSO - CSO Daily Dashboard CSO50 winners remain a step ahead To read this article in full or to leave a comment, please click here]]> 2017-05-01T03:00:00+00:00 http://www.csoonline.com/article/3192539/security/cso50-winners-remain-a-step-ahead.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=360523 False None None None CSO - CSO Daily Dashboard BrandPost: Why a One-Size Fits All Approach to Threat Intelligence Does Not Work 85 percent compounded annual growth off of $190 million in 2015 revenue and there is a long list of vendors that provide a range of threat intelligence-related services.To read this article in full or to leave a comment, please click here]]> 2017-04-28T10:53:00+00:00 http://www.csoonline.com/article/3193095/security/why-a-one-size-fits-all-approach-to-threat-intelligence-does-not-work.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=360401 False None None None CSO - CSO Daily Dashboard 54% off Logitech Bluetooth Multi-Device Keyboard - Deal Alert read reviews) on Amazon, where its typical list price of $49.99 has been recently dropped 54% to just $22.99.  See this deal now on Amazon.To read this article in full or to leave a comment, please click here]]> 2017-04-28T10:29:00+00:00 http://www.csoonline.com/article/3175793/input-keyboards/52-off-logitech-bluetooth-multi-device-keyboard-deal-alert.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=360402 False None None None CSO - CSO Daily Dashboard IDG Contributor Network: Need a fix? Steal patient data William Osler Health Systems (Osler). According to Canadian news outlet 680news, in January Osler launched an internal investigation into patient information being used to illicitly acquire a prescription narcotic, Percocet. Osler's internal narcotic stores of Percocet was inexplicably being depleted. What is unclear is if local pharmacies also reported an influx in fulfilling prescriptions for Percocet, 680news reported. Osler has not revealed the number of individuals affected. A call for clarification to Osler was not returned.To read this article in full or to leave a comment, please click here]]> 2017-04-28T09:41:00+00:00 http://www.csoonline.com/article/3192802/data-breach/need-a-fix-steal-patient-data.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=360403 False None None None CSO - CSO Daily Dashboard Cyber Resilience 2.0, now shipping new report published by Cybersecurity Ventures. (Disclaimer: Steve Morgan is the CEO and founder of Cybersecurity Ventures.)At a recent cyber resilience 'Think Tank' held in San Francisco during RSA Conference 2017, the heads of IT security, CISOs, cybersecurity industry experts, and vendor executives gathered to come up with a new definition of an old term.The report states that cyber resilience is an organization's capacity to adapt to adverse cyber events-whether the events are external or internal, malicious or unintentional-in ways that maintain the confidentiality, integrity, and availability of whatever data and service are important to the organization.To read this article in full or to leave a comment, please click here]]> 2017-04-28T09:37:00+00:00 http://www.csoonline.com/article/3193207/leadership-management/cyber-resilience-2-0-now-shipping.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=360404 False Guideline None None CSO - CSO Daily Dashboard University of Utah hires Randall Arvay as CISO To read this article in full or to leave a comment, please click here]]> 2017-04-28T06:05:00+00:00 http://www.csoonline.com/article/3193225/leadership-management/university-of-utah-hires-randall-arvay-as-ciso.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=360405 True Guideline None None CSO - CSO Daily Dashboard 9 security tools for the mobile worker Image by Kensington, Anonabox, Yubikey The highly digitized and hyper-connected world that we live in today has heightened the security stakes for us all. But if work frequently takes you away from the home office, you have some particular security and privacy concerns.To read this article in full or to leave a comment, please click here]]> 2017-04-27T10:33:00+00:00 http://www.csoonline.com/article/3192896/security/9-security-tools-for-the-mobile-worker.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=360011 False None None None CSO - CSO Daily Dashboard State-of-the-art multifactor authentication (MFA) technologies phishing texts that asked users to send over their tokens.To read this article in full or to leave a comment, please click here]]> 2017-04-27T06:42:00+00:00 http://www.csoonline.com/article/3192149/security/state-of-the-art-multifactor-authentication-mfa-technologies.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=360015 False None None None CSO - CSO Daily Dashboard 15 tricks to hold off the hackers To read this article in full or to leave a comment, please click here]]> 2017-04-27T05:21:00+00:00 http://www.csoonline.com/article/3192771/security/15-tricks-to-hold-off-the-hackers.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359831 False None None None CSO - CSO Daily Dashboard Top 4 reasons to become a CISSP CISSP (Certified Information Systems Security Professional)?"To read this article in full or to leave a comment, please click here]]> 2017-04-27T05:12:00+00:00 http://www.csoonline.com/article/3192813/it-careers/top-4-reasons-to-become-a-cissp.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359832 False None None None CSO - CSO Daily Dashboard Present and future ransomware tactics model the past To read this article in full or to leave a comment, please click here]]> 2017-04-27T04:55:00+00:00 http://www.csoonline.com/article/3192804/security/present-and-future-ransomware-tactics-model-the-past.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359834 False None None None CSO - CSO Daily Dashboard Michael Raggo joins 802 Secure as chief security officer To read this article in full or to leave a comment, please click here]]> 2017-04-27T04:29:00+00:00 http://www.csoonline.com/article/3192711/it-careers/michael-raggo-joins-802-secure-as-chief-security-officer.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359835 False None None None CSO - CSO Daily Dashboard Medical devices that could put you at security risk Arxan, ran through some of these lesser known devices. Made famous by Dick Cheney's disconnected IoT pacemaker, the security community is abuzz with speculation about potential dangers that could result from a hacked connected medical device.And while pacemakers and insulin pumps have received their 15 minutes of fame, there are a myriad of other connected medical “things” that are either already available or in development, Khera said.To read this article in full or to leave a comment, please click here]]> 2017-04-27T03:42:00+00:00 http://www.csoonline.com/article/3192357/internet-of-things/medical-devices-that-could-put-you-at-security-risk.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359836 False None None None CSO - CSO Daily Dashboard 10 ways CSOs can achieve ROI on a network solution Image by ThinkstockWith the advent of Bring Your Own Device (BYOD), WLAN network access to customers and visitors and virtualized systems, the demand for IP addresses has exploded. Small companies might have to manage more than 1,000 IP addresses and it is not unusual for larger companies to have 10,000 or more spread across many locations. Setting up and protecting the network infrastructure is a major challenge and needs to be even more sophisticated and dynamic than ever before.To read this article in full or to leave a comment, please click here]]> 2017-04-27T03:14:00+00:00 http://www.csoonline.com/article/3192303/security/10-ways-csos-can-achieve-roi-on-a-network-solution.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359837 False None None None CSO - CSO Daily Dashboard BrandPost: Small businesses increasingly in cybercriminal crosshairs To read this article in full or to leave a comment, please click here]]> 2017-04-27T02:28:00+00:00 http://www.csoonline.com/article/3192795/data-breach/small-businesses-increasingly-in-cybercriminal-crosshairs.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359733 False None None None CSO - CSO Daily Dashboard Cyberespionage, ransomware big gainers in new Verizon breach report tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016.Cyberspionage accounted for 21 percent of cases analyzed, up from 13 percent last year, and was the most common type of attack in the manufacturing, public sector, and education.In fact, in the manufacturing sector, cyberespionage accounted for 94 percent of all breaches. External actors were responsible for 93 percent of breaches, and, 91 percent of the time, the target was trade secrets.Meanwhile, the number of ransomware attacks doubled compared to the previous year.To read this article in full or to leave a comment, please click here]]> 2017-04-26T21:17:00+00:00 http://www.csoonline.com/article/3192826/security/cyberespionage-ransomware-big-gainers-in-new-verizon-breach-report.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359643 False None None None CSO - CSO Daily Dashboard Microsoft adds another layer to the Windows 10 patching onion post to a company blog. "These additional cumulative updates will contain only new non-security updates" [emphasis added].To read this article in full or to leave a comment, please click here]]> 2017-04-26T12:17:00+00:00 http://www.csoonline.com/article/3192635/windows/microsoft-adds-another-layer-to-the-windows-10-patching-onion.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359644 False None None None CSO - CSO Daily Dashboard Cyber infrastructure: Too big to fail, and failing To read this article in full or to leave a comment, please click here]]> 2017-04-26T09:04:00+00:00 http://www.csoonline.com/article/3192519/security/cyber-infrastructure-too-big-to-fail-and-failing.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359648 False None None None CSO - CSO Daily Dashboard IDG Contributor Network: IT mistakes that could cost an organization millions Image by ShutterstockOften when you are new to a job, all you can think about is making a good impression--not screwing up. In security, though, there are lots of pitfalls that can be disasterous to the organization. To read this article in full or to leave a comment, please click here]]> 2017-04-26T05:41:00+00:00 http://www.csoonline.com/article/3191990/techology-business/it-mistakes-that-could-cost-an-organization-millions.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359451 False None None None CSO - CSO Daily Dashboard Contrast Security responds to OWASP Top 10 controversy dismissing A7 as a vendor pitch.To read this article in full or to leave a comment, please click here]]> 2017-04-26T04:00:00+00:00 http://www.csoonline.com/article/3192505/security/contrast-security-responds-to-owasp-top-10-controversy.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359452 False None None None CSO - CSO Daily Dashboard Open source security risks persist in commercial software [Infographic] report based on security audits of anonymized data from more than 1,000 applications in 2016 and found that 96 percent used open source code. The analysis was done by Black Duck's Center for Open Source Research and Innovation (COSRI).The use of open source occurs in all industries by organizations of all sizes for good reason. It lowers development costs, speeds time to market, and accelerates innovation. Black Duck's On-Demand audits found that on average, open source comprised 36 percent of the code base in the scanned applications.To read this article in full or to leave a comment, please click here]]> 2017-04-26T04:00:00+00:00 http://www.csoonline.com/article/3192404/open-source-tools/open-source-security-risks-persist-in-commercial-software-infographic.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359453 False None None None CSO - CSO Daily Dashboard Five ways the U.S. is educating cybersecurity talent – and what\'s still missing To read this article in full or to leave a comment, please click here]]> 2017-04-26T03:12:00+00:00 http://www.csoonline.com/article/3191649/it-careers/five-ways-the-u-s-is-educating-cybersecurity-talent-and-what-s-still-missing.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359454 False None None None CSO - CSO Daily Dashboard Buying fraud right off the virtual rack The Fraud Attack Index report examined over 136 million transactions, discovering an almost 80 percent increase in domestic attacks over the last 12 months.  This report examines the trends in online fraud attacks across industries, comparing the different situations experienced by different industries. Overall, 2016 saw a steady rise in online fraud attack rate, which increased 8.9 percent over the course of the year. To read this article in full or to leave a comment, please click here]]> 2017-04-26T03:04:00+00:00 http://www.csoonline.com/article/3190056/fraud/buying-fraud-right-off-the-virtual-rack.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359455 False None None None CSO - CSO Daily Dashboard Why we need the FTC to police ISP privacy practices nullify a privacy rule for ISPs advanced by the FCC, it effectively stripped the market of federal oversight, McSweeny argued at a recent event on privacy policy.To read this article in full or to leave a comment, please click here]]> 2017-04-25T07:32:00+00:00 http://www.csoonline.com/article/3192310/privacy/why-we-need-the-ftc-to-police-isp-privacy-practices.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359223 False None None None CSO - CSO Daily Dashboard R2Games compromised again, over one million accounts exposed notification service LeakBase. The hacker who shared the data with LeakBase says the attack happened earlier this month.Headquartered in Shenzhen, China, R2Games operates a number of free-to-play, micropayment-driven games on iOS and Android, as well as modern browsers. The company currently supports 19 online games, and claims over 52 million players.In December of 2015, stretching into July of 2016, more than 22 million R2Games accounts were compromised, exposing IP addresses, easily cracked passwords, email addresses, and usernames.To read this article in full or to leave a comment, please click here]]> 2017-04-25T04:00:00+00:00 http://www.csoonline.com/article/3192246/security/r2games-compromised-again-over-one-million-accounts-exposed.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359226 False None None None CSO - CSO Daily Dashboard 9 questions to ask when selecting application security solutions Image by ThinkstockThere are many factors to consider when making an application security purchasing decision, and the pressure is on organizations now more than ever to improve their security risk management preparedness. In fact, more than 80 percent of security attacks target software applications, with application vulnerabilities as the No.1 cyber-attack target. Organizations need a comprehensive application security toolkit to stay secure throughout the product lifecycle, and need to address key questions that can help them determine the right tools to address security risks.To read this article in full or to leave a comment, please click here]]> 2017-04-25T03:05:00+00:00 http://www.csoonline.com/article/3190654/application-security/9-questions-to-ask-when-selecting-application-security-solutions.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359228 False None None None CSO - CSO Daily Dashboard How to track and secure open source in your enterprise limit the number of open source projects they use to a somewhat arbitrary percentage. That seems a rather obvious attempt to protest the rise of the open source R programming language for data science and analysis in a market where SAS has been dominant. But there is a good point hidden in the bluster: Using open source responsibly means knowing what you're using so you can track and maintain it.To read this article in full or to leave a comment, please click here]]> 2017-04-24T09:35:00+00:00 http://www.csoonline.com/article/3191870/open-source-tools/how-to-track-and-secure-open-source-in-your-enterprise.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359230 False None None None CSO - CSO Daily Dashboard IDG Contributor Network: Three shoddy security tropes it\'s time to retire nigh on impossible. That said, there are certain clichés that are so completely over-used that it is the height of lazy storytelling that these plot devices are rehashed again and again with no significant change.To read this article in full or to leave a comment, please click here]]> 2017-04-21T11:56:00+00:00 http://www.csoonline.com/article/3191392/security/three-shoddy-security-tropes-its-time-to-retire.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359237 False None None None CSO - CSO Daily Dashboard 75% off Lamicall S1 Cell Phone Dock - Deal Alert see reviews), where its typical list price of $39.99 has been reduced 75% to $9.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here]]> 2017-04-21T08:32:00+00:00 http://www.csoonline.com/article/3191592/gaming-gear/75-off-lamicall-s1-cell-phone-dock-deal-alert.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359238 False None None None CSO - CSO Daily Dashboard HITB Amsterdam: hackers, waffles and coffee oh my HITB Amsterdam conference.The first talk that I took in was one that tackled mainframe related security. The talk by Ayoub Elaassal called, “Breaking the fourth wall: Hacking Customer Information Control Systems” caught my attention. After having spent almost a decade in the power systems space I could not miss this presentation. I was not disappointed. I recall early on in my career a venerable grey beard looked me dead in the eye and said, “Never type $! on a mainframe.” This advice stuck with me ever since.To read this article in full or to leave a comment, please click here]]> 2017-04-21T08:09:00+00:00 http://www.csoonline.com/article/3191458/security/hitb-amsterdam-hackers-waffles-and-coffee-oh-my.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359239 False None None None CSO - CSO Daily Dashboard Cybersecurity industry braces for tighter visa rules ValiMail. "However, there are additional hires that we are considering, and we are very concerned."The entire U.S. technology industry, including the cybersecurity sector, is heavily dependent on foreign talent. Not only are U.S. companies interested in hiring the smartest people available, no matter where they are from, but there is also a severe shortage of infosec professionals.To read this article in full or to leave a comment, please click here]]> 2017-04-21T05:33:00+00:00 http://www.csoonline.com/article/3191468/it-careers/cybersecurity-industry-braces-for-tighter-visa-rules.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359240 False None None None CSO - CSO Daily Dashboard Serenova hires Stuart Clark as its first CISO To read this article in full or to leave a comment, please click here]]> 2017-04-21T04:00:00+00:00 http://www.csoonline.com/article/3191238/it-careers/contact-center-service-provider-hires-stuart-clark-as-its-first-ciso.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359241 False Guideline None None CSO - CSO Daily Dashboard IDG Contributor Network: Night at the information security museum What security practitioners can learn from the United's failures. He astutely noted that organizations should learn from failure, and ideally the failure of others. I'll take his lead and provide another learning opportunity for information security professionals.Physical security is a fundamental part of information security. In fact, operating systems base much of their security controls on an assumed secure physical infrastructure.Museums are a great example of where effective physical security comes into play. Like information security teams, museum security is often understaffed with limited budgets.To read this article in full or to leave a comment, please click here]]> 2017-04-21T03:30:00+00:00 http://www.csoonline.com/article/3191424/access-control/night-at-the-information-security-museum.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=359243 False Guideline None None CSO - CSO Daily Dashboard BrandPost: One Day Is a Lifetime in Container Years To read this article in full or to leave a comment, please click here]]> 2016-10-11T00:15:00+00:00 http://www.csoonline.com/article/3128860/security/one-day-is-a-lifetime-in-container-years.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=189928 False None None None CSO - CSO Daily Dashboard IDG Contributor Network: Diversity, STEM and Ada Lovelace Day blog, “You May Have Seen My Face on BART.” And you may have seen tweets associated with the #ILOOKLIKEANENGINEER hashtag campaign that followed in 2015. In that spirit, I decided Ada Lovelace Day was a great day to share a short blog on this topic.To read this article in full or to leave a comment, please click here]]> 2016-10-11T00:00:00+00:00 http://www.csoonline.com/article/3124408/security/diversity-stem-and-ada-lovelace-day.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=189929 False None None None CSO - CSO Daily Dashboard Terror suspect\'s locked iPhone could lead to a second Apple-FBI showdown another battle with Apple.In the wake of a mass stabbing at a Minnesota mall that was linked to the terrorist group ISIS, the FBI is looking for answers on a passcode-protected iPhone.“Dahir Adan's iPhone is locked,” FBI special agent Rich Thornton told reporters at a press conference, according to Wired. “We are in the process of assessing our legal and technical options to gain access to this device and the data it may contain.”To read this article in full or to leave a comment, please click here]]> 2016-10-10T04:48:00+00:00 http://www.csoonline.com/article/3128202/software/terror-suspects-locked-iphone-could-lead-to-a-second-apple-fbi-showdown.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=186937 False Guideline None None CSO - CSO Daily Dashboard 17 tools to protect your online security massive data breach at Yahoo, which affected at least 500 million user records, making it the largest data breach on record, might finally be what it takes to get the average internet user to take online security into their own hands - if only they knew how.To read this article in full or to leave a comment, please click here]]> 2016-10-10T03:29:00+00:00 http://www.csoonline.com/article/3129302/security/17-tools-to-protect-your-online-security.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=186715 False None Yahoo None CSO - CSO Daily Dashboard U.S. officially names Russia for election hacks, but says they can\'t attribute it To read this article in full or to leave a comment, please click here]]> 2016-10-07T13:22:00+00:00 http://www.csoonline.com/article/3129101/security/us-officially-names-russia-for-election-hacks-but-says-they-cant-attribute-it.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=176723 False None None None CSO - CSO Daily Dashboard War stories: just shut off telnet To read this article in full or to leave a comment, please click here]]> 2016-10-07T07:20:00+00:00 http://www.csoonline.com/article/3129286/security/war-stories-just-shut-off-telnet.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=176012 False None None None CSO - CSO Daily Dashboard Down but not out of options: How to keep IT security together in a company that\'s gone bankrupt Image by peteThe supply chain upon which modern multinational commerce depends was thrown into chaos earlier this year when South Korea's Hanjin Shipping filed for bankruptcy. Dozens of container ships with hundreds of crew and thousands of pounds of cargo onboard were essentially stranded at sea, as ports barred the ships' entry for fear that they wouldn't be able to pay for docking services.To read this article in full or to leave a comment, please click here]]> 2016-10-07T03:22:00+00:00 http://www.csoonline.com/article/3128196/security/down-but-not-out-of-options-how-to-keep-it-security-together-in-a-company-thats-gone-bankrupt.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=175320 False None None None CSO - CSO Daily Dashboard War stories: Logs are where the dead things dwell To read this article in full or to leave a comment, please click here]]> 2016-10-06T13:50:00+00:00 http://www.csoonline.com/article/3128819/security/war-stories-logs-are-where-the-dead-things-dwell.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=173118 False None None None CSO - CSO Daily Dashboard IDG Contributor Network: Time to kill security awareness training cybersecurity awareness training programs. I don't know who came up with the concept of “security awareness training”, but it has reached the end of its utility and should be replaced with something else. Is all we want is for users to be “aware” of security issues? Don't we want them to be educated enough to be active parts of the solutions?I looked into the history of “security awareness training”. Did we inherit it from the pioneers?To read this article in full or to leave a comment, please click here]]> 2016-10-06T13:20:00+00:00 http://www.csoonline.com/article/3128211/leadership-management/time-to-kill-security-awareness-training.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=173119 False Guideline None None CSO - CSO Daily Dashboard What CSOs can learn from the Yahoo data breach To read this article in full or to leave a comment, please click here]]> 2016-10-06T12:33:00+00:00 http://www.csoonline.com/article/3128851/security/what-csos-can-learn-from-the-yahoo-data-breach.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=173120 False None Yahoo None CSO - CSO Daily Dashboard Metadata wrecks Guccifer 2.0\'s claims of a Clinton Foundation hack checking with FOCA, the metadata shows the recently leaked documents from Guccifer 2.0 didn't actually come from the Clinton Foundation, they originated at the Democratic Congressional Campaign Committee (DCCC).Earlier this week, a hacker going by the name Guccifer 2.0 claimed on their blog that they've hacked the Clinton Foundation."So, this is the moment. I hacked the Clinton Foundation server and downloaded hundreds of thousands of docs and donors' databases. Hillary Clinton and her staff don't even bother about the information security. It was just a matter of time to gain access to the Clinton Foundation server. As you can see, the private server of the Clinton clan contains docs and donors lists of the Democratic committees, PACs, etc. Does it surprise you?" the hacker's blog post exclaims.To read this article in full or to leave a comment, please click here]]> 2016-10-06T12:30:00+00:00 http://www.csoonline.com/article/3128759/security/metadata-wrecks-guccifer-2-0s-claims-of-a-clinton-foundation-hack.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=172761 False None None None CSO - CSO Daily Dashboard Why cybersecurity spending will drive business digitization Security challenge: Wearing multiple hats in IT ]Fifty-nine percent of 10,000 C-Suite executives polled by PwC for the new Global State of Information Security Survey said they are investing more in cybersecurity, including data analytics, real-time monitoring, authentication tools that include biometrics and managed security services (MSS). David Burg, PwC's U.S. and global leader of cybersecurity and privacy, says anecdotal evidence also suggests that companies are turning to CISOs to build security into software, including anything from mobile applications to connected cars that exchange information with smartphones.To read this article in full or to leave a comment, please click here]]> 2016-10-06T12:27:00+00:00 http://www.csoonline.com/article/3128760/security/why-cybersecurity-spending-will-drive-business-digitization.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=172762 False Guideline None None CSO - CSO Daily Dashboard Drones could help with disasters like Hurricane Matthew announced Thursday it had just completed a simulation in Cape May, N.J., using unmanned planes to act as flying hot spots for 4G LTE connections. First responders could use those hot spots to communicate in remote places where wireless antennas were lost or unavailable.[Here's a video of the AT&T test.]To read this article in full or to leave a comment, please click here]]> 2016-10-06T12:26:00+00:00 http://www.csoonline.com/article/3128816/disaster-recovery/drones-could-help-with-disasters-like-hurricane-matthew.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=172763 False None None None CSO - CSO Daily Dashboard IDG Contributor Network: Calling all students, internships designed for you National Cyber Security Awareness Month. You heard it here first.  Likely not. For some of you, the very expression of cyber security awareness might make you cringe. Data was 'that' word for me a few years ago. When public education went the route of all things 'data-driven', each time I heard a department head or administrator talk about showing the data and data driven decisions, it was like nails scraping down a chalk board playing on a scratched CD.While this month will be very much in your face with tips and strategies to stay safe online and be more security-minded in your professional and personal habits, there are some discussions that are worth having not just because it's October but because the industry needs some seriously skilled professionals. To read this article in full or to leave a comment, please click here]]> 2016-10-06T10:16:00+00:00 http://www.csoonline.com/article/3128784/techology-business/calling-all-students-internships-designed-for-you.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=172602 False None None None CSO - CSO Daily Dashboard Information sharing still a heavy lift To read this article in full or to leave a comment, please click here]]> 2016-10-06T09:05:00+00:00 http://www.csoonline.com/article/3128745/security/information-sharing-still-a-heavy-lift.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=172605 False None None None CSO - CSO Daily Dashboard Business transformation proves to be a catalyst for cybersecurity spending To read this article in full or to leave a comment, please click here]]> 2016-10-06T03:27:00+00:00 http://www.csoonline.com/article/3127739/leadership-management/business-transformation-proves-to-be-a-catalyst-for-cybersecurity-spending.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=171118 False Guideline None None CSO - CSO Daily Dashboard Not so startling revelations of how a hacker broke in Image by PexelsAt the heart of every exploit, the vulnerability always lies in the target's trust for attacker supplied input. This is true whether the attack is network-based or a hacker is trying to gain physical access to a specific location. To effectively mitigate risk, companies and individuals need to take the necessary precautions to keep data secure. The saying in the cybersecurity consulting industry is “trust, but verify.”To read this article in full or to leave a comment, please click here]]> 2016-10-06T03:10:00+00:00 http://www.csoonline.com/article/3127219/security/not-so-startling-revelations-of-how-a-hacker-broke-in.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=171119 False None None None CSO - CSO Daily Dashboard Taking down the internet: possible but how probable? The hack of the Democratic National Committee this past summer, allegedly by Russia, prompted a political firestorm, but didn't cause even a ripple in the US economy. But imagine the economic firestorm that would result if online attackers brought the entire internet down, even temporarily. You may not have to imagine it, according to Bruce Schneier, CTO of Resilient Systems, cryptography guru, blogger and international authority on internet security. In a recent post titled, "Someone is Learning How to Take Down the Internet," he wrote that he had been told by multiple sources that, ““someone has been probing the defenses of … some of the major companies that provide the basic infrastructure that makes the Internet work.”To read this article in full or to leave a comment, please click here]]> 2016-10-06T03:00:00+00:00 http://www.csoonline.com/article/3127779/security/taking-down-the-internet-possible-but-how-probable.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=170975 False None None None CSO - CSO Daily Dashboard Chip card lawsuit to move forward against Visa, Mastercard, others brought the lawsuit in March.[ ALSO ON CSO: Chip card payment confusion, anger rages on ]To read this article in full or to leave a comment, please click here]]> 2016-10-05T13:00:00+00:00 http://www.csoonline.com/article/3128195/security/chip-card-lawsuit-to-move-forward-against-visa-mastercard-others.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=168716 False None None None CSO - CSO Daily Dashboard I want out of Windows patch hell Windows 10 Anniversary Update PCs has been relentlessly rebooting and rebooting and … well, you get the idea. I'm not alone. This Sisyphean cycle is plaguing many other people.Patches were welcome. After all, the Windows 10 Anniversary Update, a.k.a. Windows 10 SP1, came with a host of problems. There were unexplained freezes, Cortana was fouled up, webcams were broken and multiple third-party applications were turned into messes.To read this article in full or to leave a comment, please click here]]> 2016-10-05T10:21:00+00:00 http://www.csoonline.com/article/3128166/security/i-want-out-of-windows-patch-hell.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=167965 False None None None CSO - CSO Daily Dashboard Crisis planning: 6 ways to put people first To read this article in full or to leave a comment, please click here]]> 2016-10-05T10:07:00+00:00 http://www.csoonline.com/article/3127139/leadership-management/crisis-planning-6-ways-to-put-people-first.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=167966 False Guideline None None CSO - CSO Daily Dashboard IDG Contributor Network: Lighting up a changing world To read this article in full or to leave a comment, please click here]]> 2016-10-05T08:46:00+00:00 http://www.csoonline.com/article/3127742/security/lighting-up-a-changing-world.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=167406 False None None None CSO - CSO Daily Dashboard War stories: the water shut off valve To read this article in full or to leave a comment, please click here]]> 2016-10-05T07:14:00+00:00 http://www.csoonline.com/article/3127818/security/war-stories-the-water-shut-off-valve.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=167407 False None None None CSO - CSO Daily Dashboard Cybersecurity companies\' stock rises in face of post-Yahoo hack a rise in global cybercrime damages are seemingly responsible for a surge in the share prices of some publicly-traded cybersecurity companies.The Cybersecurity Stock Report, published quarterly by Cybersecurity Ventures, notes the PureFunds HACK ETF -- which covers 35 cyber firms -- is up 35 percent since February 2016, when it hit a low for the year.To read this article in full or to leave a comment, please click here]]> 2016-10-05T07:13:00+00:00 http://www.csoonline.com/article/3128037/security/cybersecurity-companies-stock-rises-in-face-of-post-yahoo-hack.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=167408 False None Yahoo None CSO - CSO Daily Dashboard IDG Contributor Network: Are you ready to make the move to public cloud securely to leverage its benefits? To read this article in full or to leave a comment, please click here]]> 2016-10-04T13:00:00+00:00 http://www.csoonline.com/article/3127331/cloud-security/are-you-ready-to-make-the-move-to-public-cloud-securely-to-leverage-its-benefits.html#tk.rss_all www.secnews.physaphae.fr/article.php?IdArticle=163435 False None None None