Security among the hot jobs of the future

Email not displaying correctly? View it in your browser.

CSO

CSO Update

May 09, 2017
Featured Image

Top tips for finding the right cybersecurity products

Having trouble finding the right security products for your business? You’re not the only one. We asked experienced buyers for their tips. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Security among the hot jobs of the future
Teenagers who became hackers
US device searches at borders ignite resistance
Women in cybersecurity need to take more risks

White Paper: Cybereason

2017 Threat Hunting Survey Report

Many organizations realize that threat hunting is the next step in the evolution of the modern Security Operations Center (SOC). To gain more insights on the state of threat management in SOCs, Cybereason commissioned an online survey of over 330 cybersecurity and IT professionals. Read More

Thumbnail Image
INSIDER

Security among the hot jobs of the future

It is clear that new technologies like robotics, self-driving cars, 3D printing, drones, artificial intelligence and virtual reality will create major upheavals in all sorts of labor markets, not just technology. (Think self-driving cars and taxi drivers.) So what are the jobs of the future? And how can you prepare for them? Read More

Thumbnail Image

Teenagers who became hackers

There is of course a very long history of young people getting involved in hacking—it's become almost something of a cliché. We'll take a look at the trouble teens have managed to get into online since almost the beginning of "online" as a concept. Read More

Thumbnail Image

US device searches at borders ignite resistance

In CBP's fiscal year 2015, the agency searched just 8,503 devices during 383.2 million border crossings. But in fiscal year 2016, the number of device searches jumped to 19,033, and in the first six months of FY2017, CBP searched 14,993 devices, putting the agency on pace to search nearly 30,000 devices for the year. Read More

Thumbnail Image

Women in cybersecurity need to take more risks

Projecting confidence and taking risk are keys to success for women in cyber Read More

White Paper: GreenPages Technology Solutions

5 Best Practices To Make Security Everyone's Business

Menaced by an ever-expanding array of increasingly potent threats, today's highly mobile employees are frontline participants in the struggle to secure the enterprise. So while solid security strategies must include smart policies, rigorous enforcement, and deep monitoring/ reporting, they must also reflect the needs and habits of the company's users. Read More

Top 5 Stories

1. Making sense of cybersecurity qualifications
2. Third parties leave your network open to attacks
3. Job seekers beware of recruiters
4. Recent Google Docs Phishing attack is a win for Blue Teams
5. What's the key to surviving as a cyber-security start-up?

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.