10 highest-paying IT security jobs

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Oct 13, 2016
Featured Image

Darkweb marketplaces can get you more than just spam and phish

Underground markets offer a great variety of services for cyber criminals to profit from. These forums offer items ranging from physical world items like drugs and weapons to digital world items such as spam/phishing delivery, exploit kit services, "Crypters", "Binders", custom malware development, zero-day exploits, and bulletproof hosting. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

10 highest-paying IT security jobs
Grey hats and blue skies, dealing with airline security
Bringing cyber awareness, big league
Enterprises outsmarting themselves with security, while attackers easily use common techniques

White Paper: Verizon

How Can You Make Better Use of Your Backup Data?

Your IT organization is under a lot of pressure to manage data more efficiently and provide access to it more quickly. Your current tools just can't handle the job. When the CEO's email box is unavailable because a server failed, how quickly can IT get it going again? Read More

Thumbnail Image
INSIDER

10 highest-paying IT security jobs

IT security is of major concern to all organizations, and they're willing to pay to get top talent. Read More

Thumbnail Image

Grey hats and blue skies, dealing with airline security

Since Sept. 11, 2001, the airline industry has been one of the fastest industries to upgrade their security procedures and protocols against various threats, both present and perceived. However, hackers don't need to board an airplane to gain control of the systems set in place to control it. Read More

Thumbnail Image

Bringing cyber awareness, big league

Developing a corporate culture around cyber security from the board room to the end user Read More

Thumbnail Image

Enterprises outsmarting themselves with security, while attackers easily use common techniques

Attackers use common techniques to steal data, while companies focus too much on sophisticated attacks, according to the second annual Hacker's Playbook, based on an analysis of nearly 4 million breach methods. Read More

White Paper: Verizon

Hybrid IT Survey: Part 1 of 4

Does your organization use cloud? It would be pretty surprising if it didn't. Commentators agree that the vast majority of companies now use some form of cloud-based service. But while it's undeniable that cloud has saved money for lots of companies and helped them to be more agile, whether it's delivered on the promise of making IT easier to manage is less clear. Read More

Top 5 Stories

1. Amazon resets customer passwords, while LeakedSource discloses massive update
2. WikiLeaks dumps another trove of email, allegedly from Clinton aide
3. Leaky IoT devices help hackers attack e-commerce sites
4. Time to kill security awareness training
5. US may use sanctions to punish Russia for election hacking

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.