Users have little confidence their company can protect their mobile device

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

May 02, 2017
Featured Image

Believe your employer doesn’t know about your legal problems? Think again

Companies hire a third party to scour public databases to make sure employees are not getting into legal trouble that would impact their jobs. But is it ethical? Experts explain. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Users have little confidence their company can protect their mobile device
58% off Anker Portable Charger PowerCore - Deal Alert
Need a fix? Steal patient data
No, Netflix is not a victim of Ransomware
How the insurance industry could change the game for security
ICYMI: These 10 people may be your greatest inside security risks

White Paper: Red Hat

Accelerate Automation with Ansible by Red Hat

The speed of modern business means companies must deliver better products to market faster. But extended release cycles, error-prone releases, and unauthorized shadow IT make keeping up with market demands difficult. Read More

Thumbnail Image

Users have little confidence their company can protect their mobile device

A survey sponsored by Check Point found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack. What can be done to combat that? Read More

Thumbnail Image
DealPost

58% off Anker Portable Charger PowerCore - Deal Alert

This charger weighs as little as a can of soup, yet charges the iPhone 6s seven times, the Galaxy S6 five times or the iPad mini 4 twice. Averages 4.7 out of 5 stars and currently discounted 58% on Amazon. Read More

Thumbnail Image

Need a fix? Steal patient data

Trusted insiders within the healthcare sector with access to patients, patient data and dispensaries, have unencumbered access to sensitive data and drugs. William Osler Health System (Canada) had one of their insiders break trust and access patient data, only to use the data to garner a prescribed narcotic. Read More

Thumbnail Image

No, Netflix is not a victim of Ransomware

A security firm has claimed the recent issues facing Netflix and their series "Orange is the New Black" are Ransomware, and a recent report from NBC News states the same. While no company wants to be held under the threat of ransom demands, Ransomware and extortion are two different types of problems. Read More

Thumbnail Image

How the insurance industry could change the game for security

The recent growth in the cyber insurance market is already improving security in some industry segments, and has the potential to do more -- if the industry is able to address its data problem Read More

Thumbnail Image

ICYMI: These 10 people may be your greatest inside security risks

Last year was the worst on record for information security incidents, and the majority of those were due to inside sources, many studies agree. Prime suspects are employees and contractors with privileged user access. Read More

White Paper: RSA Security Inc

Achieving High Fidelity Security: An EMA White Paper

Discover the key facets of high-fidelity security - the ability for organizations to collect comprehensive and timely data and gain context for fast and prioritized threat detection and response. Learn about the benefits of combining network and endpoint data with a strong analytic toolset. Read this analyst report for more details about a successful security monitoring program and insights for making your security team more effective. Read More

Top 5 Stories

1. Stealthy Mac malware spies on encrypted browser traffic
2. Report: Top 25 IT security products
3. There's now a tool to test for NSA spyware
4. No, Netflix is not a victim of Ransomware
5. Medical devices that could put you at security risk

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.