Newly elected French president raises questions in trying to dupe hackers

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

May 11, 2017
Featured Image

How to counteract another ‘Dyn-like’ attack

Jim Hurley, a Distinguished Analyst at technology research and advisory firm ISG, shares his insights on what enterprises using cloud-based as-a-services can do to work with their providers and reduce risks to their business from similar attacks. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Newly elected French president raises questions in trying to dupe hackers
Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert
What it takes to be a security architect
Cybersecurity market research: Top 15 statistics for 2017
Opinion: Some thoughts about Gizmodo's Phishing story
Top DRaaS companies to watch
ICYMI: How to prevent your mobile app from getting hacked

Video/Webcast: CDW | EMC

Digital Transformation Calls for New Data Center Solutions

We're in the midst of the third industrial revolution -- the era of digital business. Big data analytics and the Internet of Things are giving rise to new digital business strategies. In this webcast, you will learn how converged infrastructure, built on such technologies as virtualization and flash storage, is enabling businesses to successfully achieve digital transformation. Read More

Thumbnail Image

Newly elected French president raises questions in trying to dupe hackers

Emerging trend of cyber deception, revealed by Emmanuel Macron, may be a slippery slope. Read More

Thumbnail Image
DealPost

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now". Read More

Thumbnail Image
INSIDER

What it takes to be a security architect

While the path to security architect varies, anyone considering the role should have a passion for IT infrastructure and protecting data. Read More

Thumbnail Image
INSIDER

Cybersecurity market research: Top 15 statistics for 2017

cybersecuity market statistics Read More

Thumbnail Image

Opinion: Some thoughts about Gizmodo's Phishing story

On Tuesday, Gizmodo published a story about how easy it was to get Trump Administration officials and associates to click a Phishing link. In order to do this, the Gizmodo Special Projects Desk developed a fake Google Docs email, complete with a false sign-in page. But did they go too far? Read More

Thumbnail Image

Top DRaaS companies to watch

Forrester Research recently released its report naming Sungard AS, Bluelock, IBM, and iland as the top disaster recovery-as-a-service companies. See its reasoning why. Read More

Thumbnail Image

ICYMI: How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use Read More

White Paper: Symantec

IDC MarketScape: Worldwide Endpoint Specialized Threat Analysis and Protection 2017 Vendor Assessment

The market is flooded with endpoint security technologies, incident response tools, threat intelligence feeds, and behavioral analytics. Know what the key requirements are before shopping for modern endpoint threat detection, prevention and/or response, and remediation solutions. Read More

Top 5 Stories

1. Making sense of cybersecurity qualifications
2. Third parties leave your network open to attacks
3. Job seekers beware of recruiters
4. Recent Google Docs Phishing attack is a win for Blue Teams
5. What's the key to surviving as a cyber-security start-up?

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.