How the DOT discovered its network was compromised by shadow IT

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Feb 23, 2017
Featured Image

5 ways to spot a phishing email

Think you're clever enough to recognize a phishing attempt? Think again. Cybercriminals are getting smarter and their phishing skills are getting better, but we've put together this list of clues to help you avoid a costly error. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How the DOT discovered its network was compromised by shadow IT
Amazon Kindle Paperwhite Is Just $79.99 For a Limited Time If You Buy Refurbished - Deal Alert
7 Wi-Fi vulnerabilities beyond weak passwords
What to expect from the Trump administration on cybersecurity
What’s up with Windows patching, Microsoft?
'Tis the season to watch out for W-2 phishing scams
And the Oscar goes to… Cybersecurity!

White Paper: GE Power

2017: Top Digital Trends for the Electricity Value Network

Read about the 2017 top digital trend predictions for the power and utility industry, and gain a competitive edge by understanding what's next. Across the Electricity Value Network (EVN) - from generation through T&D and end user management, first movers and proactive digital adopters are far more likely to thrive in the future. Read More

Thumbnail Image

How the DOT discovered its network was compromised by shadow IT

Finding of hundreds of pieces of unauthorized networking equipment, including many off-the-shelf consumer-grade devices, compelled the Department of Transportation CIO to alert department leadership and launch a rearchitecture of the network. Read More

Thumbnail Image
DealPost

Amazon Kindle Paperwhite Is Just $79.99 For a Limited Time If You Buy Refurbished - Deal Alert

Amazon has discounted its refurbished Paperwhite models for a limited time, so with the current deal you can get one for just $79.99. A Refurbished Paperwhite E-reader is refurbished, tested, and certified by Amazon to look and work like new. Read More

Thumbnail Image
INSIDER

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways. Read More

Thumbnail Image

What to expect from the Trump administration on cybersecurity

Look for U.S. President Donald Trump's administration to push for increased cybersecurity spending in government, but also for increased digital surveillance and encryption workarounds. Read More

Thumbnail Image

What’s up with Windows patching, Microsoft?

A month late? Seriously? It’s both outrageous and unsurprising. Read More

Thumbnail Image

'Tis the season to watch out for W-2 phishing scams

Earlier this month, the IRS sent out an urgent alert warning employers that this W-2 phishing scam had spread beyond the corporate world to other sectors, including school districts, tribal organizations and nonprofits Read More

Thumbnail Image

And the Oscar goes to… Cybersecurity!

Imagine if the Oscars’ categories applied to cybersecurity. Read More

White Paper: GE Power

7 Ways to Achieve Operations Reliability with APM

Things are happening to your assets that you can't see - things that can stop operations at the worst possible time. What you need is a bird's eye view coupled with drill-down alerts before an issue leads to production downtime. Read More

Top 5 Stories

1. CrowdStrike attempts to sue NSS Labs to prevent test release, court denies request
2. Cylance accuses AV-Comparatives and MRG Effitas of fraud and software piracy
3. Vendors respond to Cylance's new testing methods with AV-TEST
4. Phishing campaign uses Yahoo breach to hook email
5. Salted Hash: RSA Conference 2017 – Live Blog

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.