Security among the hottest tech skills for 2017

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Dec 08, 2016
Featured Image

The security gift guide

Give the gift of security, so people will give you the gift of not asking for help and advice. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Security among the hottest tech skills for 2017
48% off Travel Cord Organizer - Electronics Accessories Case & Cable Organizer - Deal Alert
Coworking tips to increase your productivity and privacy
How to present security to the board
Why third party cybersecurity matters
November 2016: The month in hacks and breaches
ICYMI: The worst people you meet doing IT security

White Paper: Connection

10 Reasons to Upgrade to Veritas Backup Exec 16

Veritas Backup Exec 16 delivers a backup and recovery solution that meets your data protection needs simply, with a host of powerful features. Read the 10 reasons you'll want to start using Backup Exec 16 to protect your environment. Read More

Thumbnail Image

Security among the hottest tech skills for 2017

Are your assets bankable in 2017? Hiring managers say they'll seek out these skills most in the New Year. Read More

Thumbnail Image
DealPost

48% off Travel Cord Organizer - Electronics Accessories Case & Cable Organizer - Deal Alert

This travel organizer offers a secure storage space for cord management, laptop and computer accessories putting everything you need in one place. Read More

Thumbnail Image

Coworking tips to increase your productivity and privacy

More and more people today work in open offices or coworking spaces. Such environments present unique challenges and opportunities, and the following tips can help ensure personal privacy and also maximize productivity. Read More

Thumbnail Image

How to present security to the board

Part of the DNA of any CEO is in how well he or she can deliver quarterly reports (good and bad) to a Board of Directors, with the usual flair of just enough excitement to keep everybody upstairs interested, all the while keeping them at a safe distance from day-to-day operations. But communicating news of a “Security” bent to the Board on a regular basis, and ahead of an event actually being reported, can be something beyond cathartic to those holding the purse strings. Read More

Why third party cybersecurity matters

No matter how cybersecure you have made your organization, your third party relationships could undermine everything. Learn why managing third party risks matters and how it can be accomplished. Read More

Thumbnail Image
INSIDER

November 2016: The month in hacks and breaches

Here's how the holiday season is heating up for hackers. Read More

Thumbnail Image

ICYMI: The worst people you meet doing IT security

Now I've collected specific kinds of insecure employees that infosec workers have had to deal with and protect—or protect their servers from. You'll definitely recognize people you work with on this list. Hopefully you won't recognize yourself. Read More

Case Study: Connection

A Next-Generation Fan Experience: TD Garden Arena-Wide Wi-Fi Deployment

When TD Garden wanted to deliver Wi-Fi connectivity to tens of thousands of sports fans and concert goers, they needed a wireless network capable of delivering championship-caliber performance. That's why they engaged the networking experts at Connection. Working closely with Cisco and TD Garden IT staff, the Connection team designed and built one of the most innovative stadium Wi-Fi solutions in the industry. Read More

Top 5 Stories

1. Website taking donations for the assassination of Donald Trump and Mike Pence
2. Ransomware as a Service fuels explosive growth
3. 2017 security predictions
4. Researchers find a way bypass the iOS activation lock
5. Why cybersecurity companies fail at selling to CISOs... and what to do about it

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.