Moving from tech expert to business leader

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Mar 31, 2016
Featured Image
INSIDER

Survey: With all eyes on security, talent shortage sends salaries sky high

Annual IT Salary Survey shines a light on security hiring and compensation trends. Find out what your peers said about their career outlook and how your salary compares. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Moving from tech expert to business leader
US has asked Apple, Google to help unlock devices in more than 70 cases
FBI's top 10 most wanted cybercriminals
Merging firms appealing targets for attackers
5 dev tools for better code security

White Paper: Juniper Networks

2016 Predictions: Security Solutions

The security market will continue to evolve alongside new requirements arising from the Internet of Things, cloud computing and sophisticated targeted attacks. Read More

Thumbnail Image

Moving from tech expert to business leader

You've been focused on technology and security for years, but now you're ready to move into a business leader role. Where do you start? What skills do you need? Lorna Koppel, Director of Information Security for Tufts University, offers her tips for success Read More

Thumbnail Image

US has asked Apple, Google to help unlock devices in more than 70 cases

U.S. government agencies have filed more than 70 orders requiring Apple or Google to help law enforcement agencies unlock mobile devices since 2008, despite the agency's insistence that its fight with Apple in a recent terrorism case was limited in scope. Read More

Thumbnail Image

FBI's top 10 most wanted cybercriminals

The internet has impacted the world in numerous ways, but it isn't always positive. Thanks to technology, we now have the rise of the cybercriminal, and the FBI even has a most wanted list for these criminals. Read More

Thumbnail Image

Merging firms appealing targets for attackers

Companies going through a merger or acquisition, as well as their lawyers, financial advisers, and other associated firms are all tempting targets for cyberattackers, according to a new report from Digital Shadows. Read More

Thumbnail Image

5 dev tools for better code security

Static and dynamic analysis can catch vulnerabilities in the development process -- before the bad guys can even access your code Read More

White Paper: Juniper Networks

3 Major Challenges to Securing Your Data

Is your enterprise planning to leverage cloud computing and mobile computing in order to improve business agility, increase employee productivity, and lower capital expenses? Read More

Top 5 Stories

1. Ransomware attack hits MedStar Health, network offline
2. Social engineering 101: 18 ways to hack a human [Infographic]
3. Drivers targeted by GPS-based Phishing scam
4. Keeping your kids safe along with your network
5. FBI's top 10 most wanted cybercriminals

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.