Mopping up after your vendor's data breach

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Apr 12, 2017
Featured Image

Top 10 ways to achieve agile security

Find out how to enable developers to do what they wanted, when they wanted, as fast as they wanted Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Mopping up after your vendor's data breach
Get a $20 Discount If You Buy 3 Echo Dots on Amazon, For A Limited Time - Deal Alert
What it takes to become a security systems administrator
Why the board needs security leaders to fuel disciplined growth
Why you should study security in college
ICYMI: 7 tips to strengthen online security

White Paper: Workday

Demystifying Cloud Security

In terms of security, IT's best move is the one that many CIOs hesitate to make. CIOs today face a delicate, difficult balancing act between meeting business objectives and securing information. Read this whitepaper to learn how cloud computing can help IT executives meet these conflicting objectives. Read More

Thumbnail Image

Mopping up after your vendor's data breach

Get out the mop. Your vendor has been breached and your constituents are at risk. That’s what 10 states are doing right now as they clean up after America’s JobLink Alliance Technical Support informed the states of Kansas, Alabama, Arizona, Arkansas, Delaware, Idaho, Illinois, Maine, Oklahoma, and Vermont of the loss of personal identifiable information (PII) of their job seekers to an unknown malicious third party. The who, what, where, why and how of the AJLA-TS data breach affecting job seekers across ten US states. Read More

Thumbnail Image
DealPost

Get a $20 Discount If You Buy 3 Echo Dots on Amazon, For A Limited Time - Deal Alert

Put Alexa in 3 rooms for less than the price of one Echo. Echo Dot is a hands-free, voice-controlled device that uses Alexa to play music, control smart home devices, provide information, read the news, set alarms, read audiobooks from Audible, and more. Amazon has quietly published a special code that will apply a $20 discount when you buy 3. Read More

Thumbnail Image
INSIDER

What it takes to become a security systems administrator

There are many more openings for security systems administrators than qualified applicants. That creates opportunities for IT professionals willing to get the training and certification. Read More

Thumbnail Image

Why the board needs security leaders to fuel disciplined growth

Peter Cohan shares insights from his career and latest book to explain the importance of security in the boardroom and what boards and security leaders need to advance their relationship Read More

Thumbnail Image

Why you should study security in college

An expert at Brown University provides a counterpoint to an earlier story on why you don't need to study security in college. Read More

Thumbnail Image

ICYMI: 7 tips to strengthen online security

If you are online today, checking email, buying someone a gift, posting to Facebook, paying bills, streaming Netflix, or monitoring your sleeping baby, you need to practice these seven tips for protecting your online presence. Read More

White Paper: Safebreach

A New Methodology For Quantifying Risks

An invaluable technique for understanding security risks is to assess your environment. But, vulnerability assessments provide limited context, while penetration testing's point-in-time approach renders findings that are quickly out-of-date. A better approach is dynamic security assessment, as defined by Securosis analyst Mike Rothman. Read More

Top 5 Stories

1. John McAfee kicked off NYSE stage at Cyber Investing Summit due to security concerns
2. Predictive analytics can stop ransomware dead in its tracks
3. nfosec careers: There is no one true path
4. Angry Shadow Brokers release password for suspected NSA hacking tools
5. Scottrade Bank data breach exposes 20,000 customer records

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.