War stories: for your eyes only

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Oct 12, 2016
Featured Image

7 ways to take back control of your cloud strategy

Gaining visibility and control over cloud apps is the first step in putting IT professionals firmly in the driver’s seat with respect to cloud IT planning. Martin Johnson, Cloud Security Expert, Blue Coat discusses seven actions that will empower IT professionals in the cloud generation. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

War stories: for your eyes only
27% off SanDisk Connect Wireless Stick 200GB - Deal Alert
Security convergence in a utility environment
New duties of security executives
Pain in the PAM
Let’s get serious about IoT security
ICYMI: The myths and realities of hacking an election

White Paper: Legrand

Data Center Design Best Practices: Efficiencies Beyond Power And Cooling

The success and efficiency of designing your data center can be maximized though five key elements: performance, time, space, experience, and sustainability. Read More

Thumbnail Image

War stories: for your eyes only

Read More

Thumbnail Image
DealPost

27% off SanDisk Connect Wireless Stick 200GB - Deal Alert

A flash drive, reinvented. With the SanDisk Connect Stick in your pocket, in your bag or across the room, you can wirelessly access your media or transfer large files, stream HD videos and music, and save and share photos and videos to and from your mobile device. Read More

Thumbnail Image

Security convergence in a utility environment

It used to be that physical, operational and IT security were managed in isolation. However, criminals, activists and competitors don’t think that way and will use any vulnerability to gain access to your sensitive systems or facilities. It’s important that your physical and information security methods, procedures, and safeguards are not designed in isolation. Read More

Thumbnail Image

New duties of security executives

Security leaders talk about what cyber from the break room to the board room means for executives. Read More

Thumbnail Image

Pain in the PAM

In order to prevent security breaches, insider attacks and comply with regulatory mandates, organizations must proactively monitor and manage privileged access. As the compromise and misuse of identity is often at the core of modern threats, privilege accounts are a prime target for phishing and social campaigns. This article discusses the challenges organizations have with managing privileged access. Read More

Thumbnail Image

Let’s get serious about IoT security

The threats posed by IoT devices are real and have to be addressed with structural changes. Read More

Thumbnail Image

ICYMI: The myths and realities of hacking an election

Election hacking has become a key topic during this year's presidential elections, more so now that candidates and voters are being actively targeted by actors that are assumed to be acting with Russian support. In this modified edition of CSO Online's Hacked Opinions series, we explore the myths and realities of hacking an election, by speaking with a number of security experts. Read More

eBook: IBM Corporation

eBook: Six Reasons to Upgrade Your Database

Your organization is executing campaigns targeting the millennial generation and depending on social data for deeper customer insights. Managers are asking for more data from multiple sources to support new investments and product strategies. Marketing promotions are adjusted in real time based on current sales data across all channels. Read More

Top 5 Stories

1. Amazon resets customer passwords, while LeakedSource discloses massive update
2. WikiLeaks dumps another trove of email, allegedly from Clinton aide
3. Leaky IoT devices help hackers attack e-commerce sites
4. Time to kill security awareness training
5. US may use sanctions to punish Russia for election hacking

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.