Breaking down New York’s new cyber regulations

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Nov 14, 2016
Featured Image

412 million FriendFinder accounts exposed by hackers

Six databases from FriendFinder Networks Inc., the company behind some of the world’s largest adult-oriented social websites, have been circulating online since they were compromised in October. LeakedSource, a breach notification website, disclosed the incident fully on Sunday and said the compromised databases affect hundreds of millions of people. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Breaking down New York’s new cyber regulations
19% off Motorola MR350R 35-Mile Range FRS/GMRS Two-Way Radio - Deal Alert
6 ways to add cybersecurity protections to outsourcing deals
Hacker shows how easy it is to take over a city’s public Wi-Fi network
Building your InfoSec tribe
ICYMI: Darkweb marketplaces can get you more than just spam and phish

White Paper: Equinix

451 Research: Interconnection 101

As cloud usage takes off, data production grows exponentially, content pushes closer to the edge, and end users demand data and applications at all hours from all locations, the ability to connect with a wide variety of players becomes ever more important. This report introduces interconnection, its key players and business models, and trends that could affect interconnection going forward. Read More

Thumbnail Image

Breaking down New York’s new cyber regulations

Ajay Arora, CEO & Co-founder of data security startup Vera, shares insight on navigating the New York's newest set of cybersecurity regulations to help firms adopt a security strategy that scales in the face of future cybersecurity requirements. Read More

Thumbnail Image
DealPost

19% off Motorola MR350R 35-Mile Range FRS/GMRS Two-Way Radio - Deal Alert

Motorola Talkabout MR350 is the ultimate communication tool for the serious outdoor enthusiast. With a range of up to 35 miles and loaded with every possible radio feature, it's lightweight and rugged with extra large buttons to help you operate even with gloves on. Read More

Thumbnail Image

6 ways to add cybersecurity protections to outsourcing deals

There is growing concern about how third-party IT services providers are protecting corporate data. Here are six ways IT leaders can better negotiate cybersecurity and data privacy issues. Read More

Thumbnail Image

Hacker shows how easy it is to take over a city’s public Wi-Fi network

An Israeli hacker found a vulnerability in routers that could have allowed him to take over the public Wi-Fi network of an entire city. Read More

Thumbnail Image

Building your InfoSec tribe

Free resources you need to gain experience and know-how in security Read More

Thumbnail Image

ICYMI: Darkweb marketplaces can get you more than just spam and phish

Underground markets offer a great variety of services for cyber criminals to profit from. These forums offer items ranging from physical world items like drugs and weapons to digital world items such as spam/phishing delivery, exploit kit services, "Crypters", "Binders", custom malware development, zero-day exploits, and bulletproof hosting. Read More

White Paper: Innotas

Agile Portfolio Management

Although agile has been widely accepted in most organizations, it's not uncommon to feel an array of emotions or have differing opinions on the topic. Agile can mean different things to different people, but the results indisputable - faster delivery, quicker response to customer needs, and maximum delivery of value. Creating an agile portfolio roadmap can bring speed to the portfolio level and enable your organization adapt to change. Read More

Top 5 Stories

1. Researcher says Adult Friend Finder vulnerable to file inclusion vulnerabilities
2. Why senior managers are the most dangerous negligent insiders
3. 412 million FriendFinder accounts exposed by hackers
4. There’s a war on for cybersecurity talent
5. Microsoft patches 68 vulnerabilities, two actively exploited ones

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.