Crisis planning: 6 ways to put people first

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Oct 06, 2016
Featured Image

If the election is hacked, we may never know

At particular risk are touch-screen voting machines that have no paper trails. If those are hacked or a hack is even suspected, it will be difficult to prove -- and impossible to reconstruct the real tally. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Crisis planning: 6 ways to put people first
67% off Etekcity 4 Pack Portable Outdoor LED Camping Lantern with 12 AA Batteries - Deal Alert
Lighting up a changing world
War stories: the water shut off valve
US tech giants say they didn't do Yahoo-style email spying
WikiLeaks plans to dump more sensitive files on US election
Security vs. privacy: The endless fiery debate continues

White Paper: IBM Corporation

6 Essentials of a Modern B2Bi Architecture

Read this eBook to get insight on the essential elements of a modernized B2B integration architecture. Companies need a strategy as they think about modernizing their B2B integration capabilities. This eBook describes what to look for and how IBM can help. Read More

Thumbnail Image
INSIDER

Crisis planning: 6 ways to put people first

"Planning for the 'what ifs' is not just about imagining events that are hard to imagine. It is about knowing which of your business functions will determine your ability to weather a crisis," says Bill Tibbo. Read More

Thumbnail Image
DealPost

67% off Etekcity 4 Pack Portable Outdoor LED Camping Lantern with 12 AA Batteries - Deal Alert

Whether used for camping, trick or treating, or power outages, this lantern will provide up to 12 hours of bright omnidirectional LED lighting to see your surroundings. Read More

Thumbnail Image

Lighting up a changing world

Everything from water and energy utilities to medical devices to food and drug production systems benefit from lightning fast operations that can be managed remotely or automatically. That provides exponential advances in speed, cost, and quality but also add new places where our reliance on computer instructions can make us vulnerable. As the world around us “lights up,” October's Cybersecurity Awareness Month is an opportunity to think about how we make our parents, bosses, friends and co-workers aware of the opportunities and risks that come with connectivity. Read More

Thumbnail Image

War stories: the water shut off valve

Read More

Thumbnail Image

US tech giants say they didn't do Yahoo-style email spying

Reports of a secret Yahoo program to search through customers' incoming emails has spurred other tech companies to deny ever receiving a similar request from the U.S. government. Read More

Thumbnail Image

WikiLeaks plans to dump more sensitive files on US election

WikiLeaks is promising to release secret documents relating to the U.S. election, at a time when questions are already arising over whether Russian hackers are feeding the site information. Read More

Thumbnail Image

Security vs. privacy: The endless fiery debate continues

The debate about security vs. privacy has been going on since governments existed. It got a lot of discussion this week at the Cambridge Cyber Summit, but it remains unresolved. Read More

Video/Webcast: IBM Corporation

Blue Shield of California Speeds Cloud Deployment with IBM PureApplication

With their newly robust customer portal, Blue Shield of California now has the ability to grow and shrink on demand, as well as deploy new environments in hours as opposed to days - which greatly improves customer service. Read More

Top 5 Stories

1. Here are the 61 passwords that powered the Mirai IoT botnet
2. These ransomware tricks fool the most hardened security pro
3. Five tips for protecting your brand on social media
4. Android malware that can infiltrate corporate networks is spreading
5. Investment fund loses $6 million in BEC scam, suspends operations

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.