Insider wreaks havoc on company—after he resigns

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jul 11, 2017
Featured Image

Top security tools of 2017

From deception and endpoint security to cloud security and traffic analysis, we review some of the most innovative and useful security tools from today's most important cybersecurity technology categories. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Insider wreaks havoc on company—after he resigns
33% off iRobot Roomba 652 Robotic Vacuum Cleaner - Prime Day Deal Alert
Smart home device calls cops during domestic dispute
The Internet of Identities (IoI)
Buying cyber insurance: buyer beware

White Paper: Citrix

Achieve GDPR Readiness with Secure App and Data Delivery Citrix

While the GDPR represents a significant challenge for organizations, its technical provisions align with established best practices for data privacy and protection, as well as with the security principles on which Citrix solutions are built. Read More

Thumbnail Image

Insider wreaks havoc on company—after he resigns

Over the course of several weeks, a former Navarro Security employee used off-the-shelf tools to destroy files, compromise email and redirect the company's web traffic to a competitor. Read More

Thumbnail Image
DealPost

33% off iRobot Roomba 652 Robotic Vacuum Cleaner - Prime Day Deal Alert

This is a Prime Day deal good for today only. The Roomba 652 Vacuuming Robot provides a thorough clean at the push of a button. Preset Roomba to clean when it’s convenient for you, so you can keep up with everyday mess. Read More

Thumbnail Image

Smart home device calls cops during domestic dispute

A smart device is being credited for potentially saving a life when it misheard what was said, took it as a command and called the cops. Read More

The Internet of Identities (IoI)

IoT, mobility, cloud and pressing security needs mean that every node must have a trustworthy identity and a secure path to network services. Read More

Thumbnail Image

Buying cyber insurance: buyer beware

Having resilience in the face of a cyber incident is not just limited to technical. Financial risks need resilience factors like cyber insurance coverage. Read More

White Paper: Citrix

Building the Digital Workplace: What Comes Next in the Mobile Revolution

The days when having a job meant traffic jams, cubicles, and a 9-to-5 schedule are coming to an end. Work now comes to you, and with you, wherever and whenever you decide. Mobile technology and new approaches to management are creating a new kind of digital workplace that can increase productivity, lower costs, and reduce stress. The implications for organizations of all kinds - and for society as a whole - are profound. Read More

CSO Insider

1. How computer security pros hack the hackers
2. How and why to hire a CISO
3. Don’t like Mondays? Neither do attackers
4. Crowdsourcing application security closes the automated assessment gap
5. Two years after the OPM data breach: What government agencies must do now

Editor's Picks

1. 7 elements of a successful security awareness program
2. A Blue Team's reference guide to dealing with ransomware
3. How to spot and prevent insider threats
4. The fault for ransomware attacks lies with the challenges security teams face
5. Security problems exist despite CIP compliance
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.