Cybersecurity among top IT skills that employers need in 2017

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Feb 05, 2017
Featured Image

How AI is stopping criminal hacking in real time

Almost every day, there’s news about a massive data leak -- a breach at Yahoo that reveals millions of user accounts, a compromise involving Gmail phishing scams. Security professionals are constantly moving the chess pieces around, but it can be a losing battle. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Cybersecurity among top IT skills that employers need in 2017
Are Apple-specific threats on the rise?
5 things DevOps needs to do to secure containers
How to tell if Pokemon Go is malware
RSA 2017: The Internet of Things security threat

White Paper: Leidos

4 Challenges Facing Every Security Operations Center Manager

A comprehensive look at the top four challenges facing your security operations is the first step to mitigating them. Why not approach them as opportunities to strengthen your cybersecurity posture and better protect your assets! This white paper discusses the universal challenges facing every SOC: Resource allocation, Threat alert management, Vendor dependencies, Intelligence standardization Read More

Thumbnail Image
INSIDER

Cybersecurity among top IT skills that employers need in 2017

Here are the IT skills that will be in high demand for 2017. Read More

Thumbnail Image

Are Apple-specific threats on the rise?

Macs are really no more secure than a PC, but for many years there just weren’t as many out there because of the expense of the hardware and other issues. They've historically been a much less popular choice among both consumers, enterprises, and hackers alike. Read More

Thumbnail Image

5 things DevOps needs to do to secure containers

Aqua’s CTO, Amir Jerbi suggests some key things DevOps should know about securing containerized applications. Read More

Thumbnail Image

How to tell if Pokemon Go is malware

Mobile security company Zimperium is putting out the alert to make sure users are cognizant of these apps when they head into app stores. Read More

Thumbnail Image

RSA 2017: The Internet of Things security threat

RSA Conference 2017 will take on the threat posed by the internet of things, something that was demonstrated last fall by the DDoS attacks that took down Dyn data centers and many of the high-profile Websites it supports. Read More

White Paper: Leidos

5 Steps to Develop a Successful Insider Threat Detection Program

A comprehensive look into how organizations can develop and implement a successful insider threat detection program. This white paper outlines the five steps to success: Gain Leadership Support, Leverage the Latest Technology, Develop a Communications Plan, Execute a Training and Awareness Campaign, Establish a Governance Structure Read More

Top 5 Stories

1. Wordpress 0-day content injection vulnerability
2. What IT security pros are earning in 2017
3. Details on 200,000 racing fans exposed by IndyCar
4. AI isn't just for the good guys anymore
5. Are Apple-specific threats on the rise?

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.