Personalized privacy app manages smartphone permission settings

Email not displaying correctly? View it in your browser.

CSO

CSO Security Awareness Weekly

Feb 20, 2017
Featured Image

Phishing campaign uses Yahoo breach to hook email

A phishing email sent out within hours after the Yahoo breach news broke is preys on users' concern about their account security Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Personalized privacy app manages smartphone permission settings
Why (or where) many security programs fail
The 7 security threats to technology that scare experts the most
Gartner and industry experts on the booming market for security awareness training

Research/Infographic: Citrix Systems

A Day in the Life of a Remote Worker

Today's always-connected workforce demands instant, secure access to critical business apps, desktops, and data, from anywhere and from any device. Read More

Thumbnail Image

Personalized privacy app manages smartphone permission settings

New app designed to manage privacy settings helps consolidate and tailor user permissions. Read More

Thumbnail Image
Video

Why (or where) many security programs fail

At RSA 2017, CSO’s Steve Ragan chats with security expert Ira Winkler about where many security programs are failing within companies, as well as his concept of “advanced persistent security.” Watch Now

Thumbnail Image

The 7 security threats to technology that scare experts the most

Researchers from the SANS Institute outline the top seven threats that security researchers dread this year—and ransomware's just the beginning. Read More

Thumbnail Image

Gartner and industry experts on the booming market for security awareness training

Training the world's employees on how to detect and respond to spear phishing and other hacks aimed at users will cost billions of dollars. But it may be the world's best ROI in the war against cybercrime - which is predicted to cost organizations $6 trillion annually by 2021. Read More

White Paper: Citrix Systems

Best Practices to Make BYOD, CYOD and COPE Simple and Secure

Define the right bring-your-own-device (BYOD), choose-your-own-device (CYOD) and corporate-owned, personally-enabled (COPE) policies for your organization, backed by complete technologies for enterprise mobility management (EMM). Read More

Top 5 Stories

1. CrowdStrike attempts to sue NSS Labs to prevent test release, court denies request
2. Cylance accuses AV-Comparatives and MRG Effitas of fraud and software piracy
3. The 7 security threats to technology that scare experts the most
4. Hot products at RSA 2017
5. How Google reinvented security and eliminated the need for firewalls

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Security Awareness Weekly as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.