Anatomy of a well-run red-team exercise

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Jan 23, 2018
Featured Image

How bad are Meltdown and Spectre?

Some people aren't taking hardware vulnerabilities like Meltdown and Spectre seriously. Here's a point-by-point rebuttal to their arguments. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Anatomy of a well-run red-team exercise
Salted Hash Ep 15: The state of security now and the not too distant future
Are bad analogies are killing your security training program?
Security executives on the move and in the news
Penetration testing is a reference point, not a strategy
A newcomer's guide to the dark web

White Paper: Webroot Software

2017 Webroot Threat Report

The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users over the past year. Read More

Thumbnail Image

Anatomy of a well-run red-team exercise

Red team exercises – and particularly "assume compromise" or "assume breach" exercises – generally provide the most insight into your blue-team's readiness to face an attack. Read More

Thumbnail Image

Salted Hash Ep 15: The state of security now and the not too distant future

This week, Salted Hash is joined by Rob Lee, faculty fellow at the SANS Technology Institute, to talk about preventable IT security and the state of the industry as 2018 gets underway. Read More

Thumbnail Image

Are bad analogies are killing your security training program?

Humans make irrational decisions under pressure. Security training needs to focus on changing behavior, not just raising awareness. Using effective analogies can help. Read More

Thumbnail Image

Security executives on the move and in the news

Find up-to-date news of CSO, CISO and other senior security executive appointments. Read More

Thumbnail Image

Penetration testing is a reference point, not a strategy

Pen tests are valuable only if the results are properly translated into an effective overall security strategy. Read More

Thumbnail Image

A newcomer's guide to the dark web

If you can tolerate the lousy performance, unpredictable availability, and occasional shock factor of the dark web, it's worth a visit. Just don't buy anything there. Read More

White Paper: K2

5 Lessons Your Business Can Learn from Business Process Automation Leaders

According to AIIM's latest Industry Watch survey, just 19% of businesses process automation trailblazers with exceptional automation capabilities. This infographic explains what these leaders do differently: prioritize BPM, automate straight-forward processes first, focus on core BPA functionalities and workflow engines, and designate process owners. Read More

CSO Insider

1. Top security certifications: Who they're for, what they cost, and which you need
2. How to jumpstart your infosec career
3. For strong API security, you need a program not a piecemeal approach
4. Security platform or best of breed? There's only one answer
5. Keeping pace with security automation

Editor's Picks

1. What is SSL/TLS? (And why it's time to upgrade to TLS 1.3)
2. Meltdown and Spectre patches: Where to start and what to expect
3. The dirty dozen: 12 top cloud security threats for 2018
4. Best Android antivirus? The top 10 tools
5. The 6 best password managers
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.