How CISOs can answer difficult questions from CEOs

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

May 15, 2017
Featured Image

Did Kaspersky step in dog-doo?

How did Kaspersky find themselves in the cross hairs of the US intelligence community Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How CISOs can answer difficult questions from CEOs
57% off Anker PowerCore Fusion 5000 2-in-1 Portable Charger and Wall Charger - Deal Alert
Your data has been kidnapped… now what?
Dealing with WannaCry on Monday morning, and the days ahead
Incident response is like tracking down a perpetrator
HP rolls out patch to fix keylogging bug in certain laptops
Mixed reviews for Trump’s Executive Order on cybersecurity

White Paper: Fuze, Inc.

Drive Workforce Productivity and Organizational Agility with Unified Communications

It's easy to relegate your organization's communication system into the category of basic infrastructure. Rather than view communications systems as a checklist item, you should consider how your organization can harness these tools to enable its dispersed -- and increasingly younger -- workforce to work as efficiently and effectively as possible. Read More

Thumbnail Image

How CISOs can answer difficult questions from CEOs

A hypothetical conversation can become all too real, and hopefully you are prepared with the answers. Here is a script to help get you started. Read More

Thumbnail Image
DealPost

57% off Anker PowerCore Fusion 5000 2-in-1 Portable Charger and Wall Charger - Deal Alert

Charge your device and PowerCore Fusion's internal battery via a wall outlet, then take it with you for up to 3 phone charges -- any place, any time. Boasts a foldable plug to ensure maximum portability. Read More

Thumbnail Image

Your data has been kidnapped… now what?

If you think you're not a target for a cyberattack recent "ransomware" incidents should make you think again. Ransomware attacks are different than what most people perceive as a cyberattack. There's no theft of data or interest in stealing personal identification. Hackers don’t care if your company stores credit card information, medical records, login credentials or Social Security numbers. Instead, ransomware attacks leverage the importance of your business operation and access to your data, or what your computers control, to force you to pay up. Read More

Thumbnail Image

Dealing with WannaCry on Monday morning, and the days ahead

It's Monday. Across the globe organizations are likely having the same conversation: What happened? What is WannaCrypt (WannaCry)? Are we exposed? What can we do? If you're in the trenches, here's a brief outline that might help you manage some of the conversations you're going to have this week. Read More

Thumbnail Image

Incident response is like tracking down a perpetrator

What is incident response? Larry Zulch, President & CEO, Savvius, walks us through the crime scene. Read More

Thumbnail Image

HP rolls out patch to fix keylogging bug in certain laptops

Consumers with HP laptops that have been accidentally recording their keystrokes can easily address the problem with a patch from the PC maker. Read More

Thumbnail Image

Mixed reviews for Trump’s Executive Order on cybersecurity

Experts generally agree that President Trump’s cybersecurity Executive Order is well intended and a good start. But several of them have specific suggestions on how it could be improved. Read More

White Paper: Fuze, Inc.

Keep It Simple and Cost-Effective: Enable Communications and Collaboration as One

With or without you, business users are implementing new communications solutions. Read this whitepaper to discover why IT is losing control of enterprise communications, the role of millennial workers in the push for a unified approach to voice, video, and messaging, and how IT can use the desire for unified communications to reassert your business value. Read More

Top 5 Stories

1. Microsoft patches Windows XP and Server 2003 due to WannaCrypt attacks
2. A 'kill switch' is slowing the spread of WannaCry ransomware
3. Did Kaspersky step in dog-doo?
4. Vendors approve of NIST password draft
5. A ransomware attack is spreading worldwide, using alleged NSA exploit

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.