Big Brother is listening as well as watching

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Jul 05, 2016
Featured Image

Examining man-in-the-middle attacks

David Richardson, director of product at Lookout, walks us through this all-too-common attack.   Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Big Brother is listening as well as watching
How social media is changing what can be said, when and where
9 critical controls for today's threats
Is your car secure? Maybe not, but enterprise users can still learn something

White Paper: Progress Software

5 Reasons to Adopt Business Rules

Learn 5 simple reasons you need business rules to help speed up workflows, bring new products to market and better serve your customers. Read More

Thumbnail Image

Big Brother is listening as well as watching

The professed goal of audio surveillance on mass transit systems may be to protect passengers. But privacy advocates say it crosses a line, amounting to violations of free speech and the right to be free from unwarranted and ‘unreasonable’ searches. Read More

Thumbnail Image

How social media is changing what can be said, when and where

There are many benefits to having your employees active on social media. Exposure, name recognition and free publicity come to mind. But there are potholes along the way. Read More

Thumbnail Image

9 critical controls for today's threats

Many controls we've used for years can't effectively deal with today's threats. We must extend some and add others to prevent, detect, and respond to emerging threats to our business operations. Read More

Thumbnail Image

Is your car secure? Maybe not, but enterprise users can still learn something

If you're looking for a good lesson in enterprise security, there might be a few sitting in the parking lot. The automotive field is a glaring example of "worst practices" in security, say several automotive experts. And, the problem is only getting worse, not better. Read More

White Paper: Transition Networks

7 Best Practices for Evolving Data Center Networks Utilizing Media

The foundation of any data center network is the physical layer; the fiber and copper cables that connect users, servers, storage and, in the era of the Internet of Things, things. The always increasing demand on these networks requires data centers to constantly upgrade. The following 7 best practices provide a glimpse beyond the speeds and feeds to other key factors to consider when adding or expanding a media conversion system. Read More

Top 5 Stories

1. Dangerous keyboard app has more than 50 million downloads
2. This malware pretends to be WhatsApp, Uber and Google Play
3. 11 ways to fight off ransomware
4. Account security: moving past the password
5. Hard Rock Las Vegas suffers a second data breach

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.