Cybersecurity engineer among the hottest IT jobs on the market

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Mar 12, 2017
Featured Image

The IT equipment you can take into battle

If you're in IT, you're as familiar with your laptop and your cell phone as a farmer is with his tools. And just like Japanese farmers with their kama, you might find yourself using one of those tools in battle, for offense or defense. We admit, that's pretty unlikely—but we'll step you through some of the odder possibilities. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Cybersecurity engineer among the hottest IT jobs on the market
Bots: Biggest player on the cybercrime block
Protecting the enterprise against mobile threats
What's the value in attack attribution?
Profiling 10 types of hackers

White Paper: Scribe Software

10 Best Practices for Integrating Your Customer Data

Data integration is often underestimated and poorly implemented, taking significant time and resources. Yet, it continues to grow in strategic importance to the business, as customer data and touch points grow with the emergence of cloud, social and mobile technologies. This white paper describes common integration mistakes and best practices for making your company more agile through data integration. Read More

Thumbnail Image
INSIDER

Cybersecurity engineer among the hottest IT jobs on the market

Live in or around one of the five largest metro areas in the U.S.? Here’s what you can expect to make in three of the hottest IT roles around. Read More

Thumbnail Image

Bots: Biggest player on the cybercrime block

Bot fraud cost an estimated $31 billion in the US last year, dwarfing the estimated $1 billion lost to ransomware and DDoS attacks. Read More

Thumbnail Image

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though? Read More

Thumbnail Image

What's the value in attack attribution?

Does attack attribution and knowing your adversaries really matter when it comes to securing the enterprise? Read More

Thumbnail Image

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks. Read More

White Paper: Veeam Software

10 Must-Read Lessons for an Always-On Successful Oil & Gas Enterprise

Oil and gas (O&G) companies are embracing digital transformation as the key driver of business value. As data centers modernize and data volumes grow, leaders depend on data availability for competitive advantage and risk avoidance. Read More

Top 5 Stories

1. Spammers expose their entire operation through bad backups
2. SpammerGate: The takeaway lessons and follow-ups on the River City media data breach
3. Cybersecurity salaries for sales engineers are $180,000 to $220,000 in 2017
4. How to destroy angels
5. Cisco and Apache issue warnings over Zero-Day flaw being targeted in the wild

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.