Cybersecurity confidence gets a C- . How to improve your grade in 2017

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Dec 22, 2016
Featured Image
INSIDER

The 15 best job markets for IT security specialists

Here is a look at the top 15 job markets for information security professionals, according to the recent study, “Where Are the Highest Paying Tech Jobs in the US” from Indeed.com. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Cybersecurity confidence gets a C- . How to improve your grade in 2017
23% off HDMI Cloner Box for Gaming or HD Video Stream Capture, No PC needed - Deal Alert
Remain paranoid, err vigilant, with online security in 2017
The year ransomware became one of the top threats to enterprises
How to get more from your security budget
ICYMI: 10 top holiday phishing scams

White Paper: Fortinet, Inc.

Advanced Threats, Advanced Solutions: Integrating a Sandbox Into Your Infrastructure

The volume of threats is increasing, and cybercriminals are enhancing their techniques every day. Companies struggle to proactively see the threats that are coming, knowing when they have been breached and reacting quickly to minimize the threat. Download this whitepaper to learn about 12 different advanced malware techniques being used today and how sandboxing is an incredible tool that can help. Read More

Thumbnail Image

Cybersecurity confidence gets a C- . How to improve your grade in 2017

Many security professionals feel less than certain about their own cyber defenses. Research firm CyberEdge Group and Tenable Network Security asked 700 security practitioners in nine countries and across seven industry verticals about their overall confidence that the world’s cyber defenses are meeting expectations. Read More

Thumbnail Image
DealPost

23% off HDMI Cloner Box for Gaming or HD Video Stream Capture, No PC needed - Deal Alert

Clone video from virtually any video device including game consoles and DVD/Blu-ray. With the push of a button, this device captures and records to any attached USB stick, with no PC required. Read More

Thumbnail Image
INSIDER

Remain paranoid, err vigilant, with online security in 2017

You didn’t think we were going to say you can now relax your security awareness training, did you? Read More

Thumbnail Image

The year ransomware became one of the top threats to enterprises

Ransomware creators are increasingly targeting companies and other organizations, sometimes using techniques borrowed from cyberespionage attacks, because they're likely to pay more money for their data. Read More

Thumbnail Image
INSIDER

How to get more from your security budget

Here’s how to get more from your stretched security budget. Read More

Thumbnail Image

ICYMI: 10 top holiday phishing scams

It always happens this time of year, an influx of holiday-related scams circulating the interwebs. Scams don't wait for the holidays, but scammers do take advantage of the increased shopping and distraction when things get busy to take your money and personal information. Here are a six holiday threats to watch out for. Read More

White Paper: Fortinet, Inc.

Best Practices in Network Segmentation for Security

With the rise of BYOD, cloud-based services, and IoT, network boundaries are expanding and becoming increasingly difficult to secure. The enterprise perimeter is often penetrated and once inside, malware can move through the network, launching a devastating attack. In this research note by Gartner, learn how to implement better network segmentation to reduce or eliminate threats from spreading throughout your network. Read More

Top 5 Stories

1. Switch from Yahoo Mail to Gmail, and turn your phone into a physical key
2. What 2017 has in store for cybersecurity
3. Top 15 security predictions for 2017
4. 14 eyebrow-raising things Google knows about you
5. Phishing email scams 108 government employees, 756,000 people affected by breach

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.