Security engineer among 15 unfilled tech jobs that cost the U.S. billions

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Mar 01, 2017
Featured Image

Five Terminator movies have taught us nothing

In a new study of leading robot manufacturers, most had serious security vulnerabilities which could allow hackers to take over and reprogram the robots to spy on their owners, cause property damage, or even attack humans. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Security engineer among 15 unfilled tech jobs that cost the U.S. billions
20% off APC Back-UPS 600VA 7-outlet Uninterruptible Power Supply (UPS) with USB Charging Port - Deal Alert
A better security strategy than ‘know your enemy’: Know your co-workers
Here’s a new way to prevent cyberattacks on home devices
Global cybercrime prosecution a patchwork of alliances
February 2017: The month in hacks and breaches
Smart teddy bear maker faces scrutiny over data breach response

Video/Webcast: Hewlett Packard Enterprise

5 Steps Towards Autonomous IT Operations with HPE Operations Bridge

Digital divide, digital enterprise, and transformation all impact your IT, especially as business teams demand more with less. It hasn't been so daunting for numerous customers who have evolved their operations using our HPE Operations Bridge software. Would you like learn how to reduce MTTR by 58%? Would you like to perform 50% more work with the same IT Operations staff? Join us to learn how to do that, and who already has. Read More

Thumbnail Image
INSIDER

Security engineer among 15 unfilled tech jobs that cost the U.S. billions

What's the overall cost of unfilled technology jobs? New research from Glassdoor shows it's in the billions. Read More

Thumbnail Image
DealPost

20% off APC Back-UPS 600VA 7-outlet Uninterruptible Power Supply (UPS) with USB Charging Port - Deal Alert

The new APC BE600M1 Back-UPS has 7 total outlets: 5 battery backup outlets plus 2 Surge Protection outlets, more than ever before. BE600M1 Back-UPS is capable of powering your wireless networking equipment for 2 to 6 hours when power is lost. Read More

Thumbnail Image

A better security strategy than ‘know your enemy’: Know your co-workers

Something as simple as an uncharacteristic turn of phrase can clue people into an email’s illegitimacy. Read More

Thumbnail Image

Here’s a new way to prevent cyberattacks on home devices

Homeowners worried about cybersecurity attacks on IP-connected devices like lights, baby monitors, home security systems and cameras, will soon be able to take advantage of a $200 network monitoring device called Dojo. Read More

Thumbnail Image

Global cybercrime prosecution a patchwork of alliances

Global efforts to combat cybercrime are built on a patchwork of alliances, taskforces and personal relationships. Read More

Thumbnail Image
INSIDER

February 2017: The month in hacks and breaches

An unsecured MongoDB database, sluggishness about disclosing and patching vulnerabilities, and “I was just curious” were among the contributing factors to the month’s incidents. Read More

Thumbnail Image

Smart teddy bear maker faces scrutiny over data breach response

Did a toymaker ignore warnings about a data breach? That’s a key question swirling around Spiral Toys, a company behind a line of smart stuffed animals that security researchers worry can be easily hacked. Read More

White Paper: Winshuttle

5 Ways Excel Accelerates Your Return On SAP FICO Business Processes

How can a finance and/or controller professional access SAP FICO data leveraging Microsoft Excel in a highly usable and interoperable fashion while respecting all of the SAP core security and governance controls? Read More

Top 5 Stories

1. 5 ways to spot a phishing email
2. Carders capitalize on Cloudflare problems, claim 150 million logins for sale
3. 7 universal rules of threat intelligence
4. Who should be on an insider risk team?
5. Bleeding clouds: Cloudflare server errors blamed for leaked customer data

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.