Some people aren't taking hardware vulnerabilities like Meltdown and Spectre seriously. Here's a point-by-point rebuttal to their arguments. Read More ▶ | | | White Paper: Webroot Software The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users over the past year. Read More ▶ | Red team exercises – and particularly "assume compromise" or "assume breach" exercises – generally provide the most insight into your blue-team's readiness to face an attack. Read More ▶ | | This week, Salted Hash is joined by Rob Lee, faculty fellow at the SANS Technology Institute, to talk about preventable IT security and the state of the industry as 2018 gets underway. Read More ▶ | | | Humans make irrational decisions under pressure. Security training needs to focus on changing behavior, not just raising awareness. Using effective analogies can help. Read More ▶ | | Find up-to-date news of CSO, CISO and other senior security executive appointments. Read More ▶ | | Pen tests are valuable only if the results are properly translated into an effective overall security strategy. Read More ▶ | | If you can tolerate the lousy performance, unpredictable availability, and occasional shock factor of the dark web, it's worth a visit. Just don't buy anything there. Read More ▶ | | White Paper: K2 According to AIIM's latest Industry Watch survey, just 19% of businesses process automation trailblazers with exceptional automation capabilities. This infographic explains what these leaders do differently: prioritize BPM, automate straight-forward processes first, focus on core BPA functionalities and workflow engines, and designate process owners. Read More ▶ | CSO Insider | Editor's Picks | | | |