8 ways to manage an internet or security crisis

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

May 16, 2017
Featured Image

Paying the WannaCry ransom will probably get you nothing. Here's why.

Last Friday’s massive WannaCry ransomware attack means victims around the world are facing a tough question: Should they pay the ransom? Those who do shouldn't expect a quick response -- or any response at all. Even after payment, the ransomware doesn’t automatically release your computer and decrypt your files. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

8 ways to manage an internet or security crisis
67% off ThermoPro TP03A Digital Food Cooking Thermometer Instant Read Meat Thermometer for Kitchen BBQ Grill Smoker
Vocal theft on the horizon
Risks to the enterprise from the one-trick pony
Secure platforms as a service allow you to focus on function
Facebook hit with maximum fine for breaking French privacy law
WannaCry attacks are only the beginning

White Paper: Viavi Solutions

10th Annual State of The Network Study

The Tenth Annual State of the Network Global Study focuses a lens on the network team's role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. Read More

Thumbnail Image

8 ways to manage an internet or security crisis

IT, communications and security experts share tips on what to do when your business is hit with an IT-related disaster, such as a cyberattack, an ecommerce site crash or a software failure. Read More

Thumbnail Image
DealPost

67% off ThermoPro TP03A Digital Food Cooking Thermometer Instant Read Meat Thermometer for Kitchen BBQ Grill Smoker

The ThermoPro TP03A is an effective solution to achieve the most accurate temperature in a matter of seconds. Read More

Thumbnail Image

Vocal theft on the horizon

Voice imitation technology has the potential to undermine yet another form of biometric authentication. Security experts say the key is to make sure the individual voice information is stored on the user’s device, not in a centralized database. Read More

Thumbnail Image

Risks to the enterprise from the one-trick pony

Whether an adversary is highly skilled and targeting an organization or taking advantage of a black market service to make a few bucks, any threat is a threat. Read More

Thumbnail Image

Secure platforms as a service allow you to focus on function

Learn what to expect from this new class of security-focused, container-based cloud platforms. Read More

Thumbnail Image

Facebook hit with maximum fine for breaking French privacy law

The French data protection watchdog has imposed its harshest penalty on Facebook for six breaches of French privacy law. Read More

Thumbnail Image

WannaCry attacks are only the beginning

As the WannaCry ransomware attack evolves, more cybercriminals are likely to attempt to profit from the vulnerability it exploits and similar flaws in the future. Read More

White Paper: Viavi Solutions

APM for Security Forensics

The right Application Performance Management (APM) solution can help IT operations deliver superior performance for users. When incorporated into your IT security initiatives, deep packet inspection can strengthen your existing antivirus software, Intrusion Detection System (IDS), and Data Loss Prevention (DLP) solutions. Read More

Top 5 Stories

1. Microsoft patches Windows XP and Server 2003 due to WannaCrypt attacks
2. A 'kill switch' is slowing the spread of WannaCry ransomware
3. Did Kaspersky step in dog-doo?
4. Vendors approve of NIST password draft
5. A ransomware attack is spreading worldwide, using alleged NSA exploit

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.