5 apps for encrypting and shredding files

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Oct 25, 2016
Featured Image

How to approach keeping your IoT devices safe

With the recent take down of DYN and Brian Krebs’ web site, cybercriminals have found a way to use your own devices to bring the internet to its knees. Portnox’s CEO Ofer Amitai provides some ways to keep those devices safe from these attacks. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

5 apps for encrypting and shredding files
Best Deals of the Week, October 17th - October 21st - Deal Alert
REVIEW: BIO-key’s plug-in fingerprint readers for Windows 10 computers
Cybersecurity staffing issues may be putting you at risk
Name and shame cybersecurity: a gift for cybercriminals?
Overweight, out of shape: Hack your body back
ICYMI: The myths and realities of hacking an election

White Paper: Kaseya

Automation Cheat Sheet For HIPAA IT Compliance

Ever since the Health Insurance Portability and Accountability Act of 1996 (HIPAA) debuted, small and medium-size healthcare organizations have been struggling to comply. And with new rules coming out with regularity, the process becomes more rigorous all the time. This comprehensive cheat sheet outlines all the processes you should be automating right now to make the next HIPAA IT audit simpler, faster, and less scary. Read More

Thumbnail Image
INSIDER

5 apps for encrypting and shredding files

If you want to protect sensitive data -- especially if you’re sending it via email or via an online service -- one of these five encryption programs can help. Read More

Thumbnail Image
DealPost

Best Deals of the Week, October 17th - October 21st - Deal Alert

Check out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of October 17th. All items are highly rated, and dramatically discounted. Read More

Thumbnail Image
INSIDER

REVIEW: BIO-key’s plug-in fingerprint readers for Windows 10 computers

BIO-key loaned me these three models for evaluation. I tested them on two notebooks: one running Windows 10 Home, and the other Windows 10 Pro. Find out the results. Read More

Thumbnail Image

Cybersecurity staffing issues may be putting you at risk

Cybersecurity is a priority for most businesses, but many are finding a lack of available cybersecurity talent. But not being able to hire the right candidates is no excuse to ignore your security needs. Read More

Thumbnail Image

Name and shame cybersecurity: a gift for cybercriminals?

Cybersecurity “name and shame” practice may significantly boost global cybercrime. Read More

Thumbnail Image

Overweight, out of shape: Hack your body back

The sedentary lifestyle of a security practitioner can wreak havoc on your physical health Read More

Thumbnail Image

ICYMI: The myths and realities of hacking an election

Election hacking has become a key topic during this year's presidential elections, more so now that candidates and voters are being actively targeted by actors that are assumed to be acting with Russian support. In this modified edition of CSO Online's Hacked Opinions series, we explore the myths and realities of hacking an election, by speaking with a number of security experts. Read More

White Paper: Kaseya

Banking IT Systems Management: Challenges and Solutions

Banking systems are inherently distributed in multiple branch and ATM locations, as well as home banking over the internet. As the number of access points grows, so does the complexity of IT systems management. Systems need to be readily available and productive yet secure and protected from data-breach. Read More

Top 5 Stories

1. John McAfee: 'Iran hacked the DNC, and North Korea hacked DYN'
2. Taking down the internet: possible but how probable?
3. Free tool protects PCs from master boot record attacks
4. DNS provider Dyn gets DDoSed, takes out Twitter, GitHub and plenty others
5. DDoS knocks down DNS, data centers across the U.S. affected

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.