Report finds the security of confidential documents is a significant problem

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Mar 14, 2017
Featured Image

Disaster recovery: How is your business set up to survive an outage?

Can your business get by with an asynchronous backup or must that offsite server be updated by the second to keep the business up and running at all times. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Report finds the security of confidential documents is a significant problem
42% off AcuRite 5-in-1 Pro Weather Station with Remote Monitoring - Deal Alert
How much are vendor security assurances worth after the CIA leaks?
Is your family's cybersecurity worth $20 a month?
Is the cyber crisis real or fiction?
ICYMI: The future of biometrics and IoT

White Paper: Data Foundry

7 Reasons Why Fortune 5 Companies Utilize Colocation

If building and operating enterprise data centers was always the best course of action, all the companies that had the cash flow to do so would do it. There are several reasons Fortune 5 companies continue to engage colocation providers rather than exclusively running their own data centers. Read More

Thumbnail Image

Report finds the security of confidential documents is a significant problem

60 percent of survey respondents say sensitive documents have accidentally been sent to the wrong person. Read More

Thumbnail Image
DealPost

42% off AcuRite 5-in-1 Pro Weather Station with Remote Monitoring - Deal Alert

High-precision 5-in-1 wireless weather sensor accurately measures the temperature, humidity, wind speed, wind direction and rain. PC Connect feature interfaces with a Windows computer via USB, allowing you to remotely view your weather from anywhere. Read More

Thumbnail Image

How much are vendor security assurances worth after the CIA leaks?

Google, Apple, Microsoft and other software vendors are working to identify and patch the vulnerabilities described in the CIA leak, but ultimately this doesn't change the status quo of software security. Read More

Thumbnail Image

Is your family's cybersecurity worth $20 a month?

If you're anything like me you're probably constantly on the prowl for WiFi networks to log into so that you can work, listen to music, browse, shop or read. Without being connected to the cloud via the internet your laptop or iPad becomes a high-tech paperweight. And there are two ways that you can connect mobile devices to the internet: through a WiFi network or a cellular network. Read More

Thumbnail Image

Is the cyber crisis real or fiction?

There has been a lot of commentary about the cybersecurity hiring crisis. Reports indicate that there are too few candidates for positions and there is no assurance that the future will be better. Is this reported crisis real? It may be that enterprises are not stepping up to train new candidates for cyber roles or not recognizing that cyber is how business has to be done and not just the responsibility of the designated security officer. Read More

Thumbnail Image
INSIDER

ICYMI: The future of biometrics and IoT

Many people are familiar with biometrics as a security measure at airports or police stations, where they often use a fingerprint as a form of identification, but there are many other uses outside of law enforcement. Read More

eBook: Jamf

A User-Centric Focus: Shaping the IT Landscape

With technology seemingly everywhere, a new generation of employees seeks a seemingly modern technology experience at work. This shift in employee mentality is prompting IT to reevaluate the definition of IT service, and the practices and workflows they deploy to users. The question is how does IT shift their practices to embrace the user-centric trend? Read More

Top 5 Stories

1. Spammers expose their entire operation through bad backups
2. How to destroy angels
3. Danes targeted by malware spread through Dropbox
4. After CIA leak, Intel Security releases detection tool for EFI rootkits
5. 7 (more) security TED Talks you can’t miss

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.