How AI is stopping criminal hacking in real time

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Feb 07, 2017
Featured Image
INSIDER

Hacking the 2016 election: A timeline

Russian interference in the 2016 U.S. election played out in a series of hacks taking place over several months. Here’s how the attacks unfolded. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How AI is stopping criminal hacking in real time
43% off Caller-ID Call Blocker For Robo-calls, Telemarketers and Other Nuisances - Deal Alert
The security theory and troubling practice behind the TSA's PreCheck security lines
29,000 taxpayers affected by W-2 scams, IRS issues new warning
Friends or enemies? Security vendors tiptoe towards collaboration
How to secure Active Directory
ICYMI: How to eliminate insider threats

eBook: GE Power

5 Security Imperatives for Power Executives

Your peers are feeling the urgency to assess their attack surface and put in place the right processes and technology. Learn how you can approach cyber security protection to gain greater production reliability and operational safety. Read More

Thumbnail Image

How AI is stopping criminal hacking in real time

Almost every day, there’s news about a massive data leak -- a breach at Yahoo that reveals millions of user accounts, a compromise involving Gmail phishing scams. Security professionals are constantly moving the chess pieces around, but it can be a losing battle. Read More

Thumbnail Image
DealPost

43% off Caller-ID Call Blocker For Robo-calls, Telemarketers and Other Nuisances - Deal Alert

Just hit the big red button and put an end to robocalls, telemarketer calls, solicitor calls, elections calls and junk faxes. Can also block international and private numbers, as well as full area codes. Read More

Thumbnail Image

The security theory and troubling practice behind the TSA's PreCheck security lines

What is up with the TSA PreCheck program? Aside from being convenient, how does one get that pass through the security checkpoint? And how do you prove you are not a threat? Read More

Thumbnail Image

29,000 taxpayers affected by W-2 scams, IRS issues new warning

Last week, the Internal Revenue Service issued a new warning to employers, urging them to stay alert as reports of compromised W-2 records started to climb. At least 29,000 taxpayers have been affected by W-2 scams since the tax season started last month. Read More

Thumbnail Image

Friends or enemies? Security vendors tiptoe towards collaboration

The information security vendor community is extremely competitive. But when all suppliers supposedly share the common goal of making us as citizens and businesses secure, should they be doing more to work together? Read More

Thumbnail Image

How to secure Active Directory

Russell Rice, senior director of product management at Skyport Systems, provides some ways IT organizations can keep privileged credentials for Active Directory safe. Read More

Thumbnail Image

ICYMI: How to eliminate insider threats

Mike McKee, CEO OF ObserveIT, lists some tips to help organizations quickly jump on any irregularities that come from within your company’s network. Read More

White Paper: GE Power

7 US Homeland Security Strategies

Don't wait to implement your cyber protection program. Start developing your approach with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment. Read More

Top 5 Stories

1. How to tell if Pokemon Go is malware
2. How AI is stopping criminal hacking in real time
3. Cybersecurity's million dollar jobs
4. 29,000 taxpayers affected by W-2 scams, IRS issues new warning
5. Wordpress 0-day content injection vulnerability

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.