What it takes to become an information assurance analyst

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Mar 30, 2017
Featured Image

10 security risks of wearables

Fitness trackers may not present a huge security risk, but any connected device can be hacked. Here’s what you need to know to minimize those security and privacy threats. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What it takes to become an information assurance analyst
Black-hat hackers more daring and experienced than white-hat hackers
AI will transform information security, but it won’t happen overnight
Study finds devices are not wiped properly
Insecure security cameras sound like a joke, but aren’t

White Paper: Lookout Mobile Security

Are You Prepared? The Future of Enterprise Mobile Security

As threats to enterprise mobility continue to intensify, the mobile security industry is evolving quickly. In this report, Lookout co-founders John Hering and Kevin Mahaffey share their predictions for what important new changes are coming and how you can best prepare your organization for success. Read More

Thumbnail Image
INSIDER

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his sights are set now. Read More

Thumbnail Image

Black-hat hackers more daring and experienced than white-hat hackers

Sixty-five percent of respondents to a poll say black hats are more experienced than white hats. Read More

Thumbnail Image

AI will transform information security, but it won’t happen overnight

Artificial Intelligence technologies are evolving quickly, but can they aid an InfoSec community still grappling with default passwords and SQLi attacks? Read More

Thumbnail Image

Study finds devices are not wiped properly

The National Association for Information Destruction (NAID) found in a recent study that 40 percent of the devices that bought from secondhand markets had PII on them. Read More

Thumbnail Image

Insecure security cameras sound like a joke, but aren’t

They’re an example of big tech companies’ failure to take security seriously. Read More

White Paper: Lookout Mobile Security

Enterprise Mobile Security 101: Understanding the Basics

Read the eBook to learn the difference between securing mobility and mobile security, why Enterprise Mobility Management/ Mobile Device Management (EMM/ MDM) solutions alone are not security, and the kinds of attacks your mobile fleet might be facing. Read More

Top 5 Stories

1. Three privacy tools that block your Internet provider from tracking you
2. API flaws said to have left Symantec SSL certificates vulnerable to compromise
3. Bot attacking gift card accounts
4. If you think ransomware is a user failure, you’re a failure
5. Social engineering fake outs

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.