CSO50 2016 winners announced

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Mar 10, 2016
Featured Image
Video

Behind the scenes of Vidder's $10K hacking contest

At the RSA Conference in San Francisco, CSO's Steve Ragan chats with Junaid Islam, president and CEO of Vidder, about their $10,000 hacking contest at the show, and how the company's software-defined perimeter technology protects sensitive data. Watch Now

Twitter Facebook LinkedIn

Your Must-Read Stories

CSO50 2016 winners announced
Experts say 'chip off' procedure to access terrorist's iPhone is risky
FTC orders nine PCI auditors to share assessment details
Is DevOps good or bad for security?

White Paper: Hewlett Packard Enterprise

2015 Cost of Cyber Crime Study: Global

Discover the most salient findings of this enterprise security and intelligence study and learn what you can do to protect your organization. Read More

Thumbnail Image
INSIDER

CSO50 2016 winners announced

The CSO50 recognizes 50 security projects, taken on by 45 organizations, that demonstrate outstanding thought leadership and business value. These are their stories. Read More

Thumbnail Image

Experts say 'chip off' procedure to access terrorist's iPhone is risky

The iPhone 5c at the center of the legal battle between Apple and the FBI might be accessible through a delicate hardware technique, but experts warn it would be difficult. Read More

Thumbnail Image

FTC orders nine PCI auditors to share assessment details

The FTC is on a data breach enforcement roll. Last summer, the courts allowed it to fine companies with weak cybersecurity practices. Now, the FTC is taking a closer look at payments processing, checking to see how auditors measure compliance with industry rules Read More

Thumbnail Image

Is DevOps good or bad for security?

Does DevOps give you better security through agility or make development and deployment too fast to secure? Read More

White Paper: Hewlett Packard Enterprise

2016 State of Security Operations

Hacker attacks are increasing, and the cost to businesses is growing. Experts tell us it's not if you'll be breached, it's when. So the effectiveness of your security operations determines how much damage you'll suffer. Read More

Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.