Who makes better cybersecurity decisions, men or women?

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Feb 20, 2017
Featured Image

Users take the cheese to solve data breaches

Verizon releases its annual breach report that puts the reader in the driver's seat. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Who makes better cybersecurity decisions, men or women?
30% off Veepeak USB Rechargeable LED Motion Sensor Light for Closet with Magnetic Mounting - Deal Alert
Tech groups gear up for FISA surveillance fight
Phishing campaign uses Yahoo breach to hook email
Personalized privacy app manages smartphone permission settings
ICYMI: Can you spot the phish?

Research/Infographic: Citrix Systems

A Day in the Life of a Remote Worker

Today's always-connected workforce demands instant, secure access to critical business apps, desktops, and data, from anywhere and from any device. Read More

Thumbnail Image

Who makes better cybersecurity decisions, men or women?

There’s a common perception that men and women make decisions differently. When high-risk decisions are being made, we need both genders in the room because these two approaches balance one another and the resulting decision will be stronger because it incorporates different approaches. Read More

Thumbnail Image
DealPost

30% off Veepeak USB Rechargeable LED Motion Sensor Light for Closet with Magnetic Mounting - Deal Alert

The Veepeak USB Rechargeable Motion Sensor Light offers a simple solution to lighting any area inside your home. The portable and detachable design makes it versatile enough to be used as a night light in hallways and bedrooms or as a cabinet or closet light for dim areas Read More

Thumbnail Image

Tech groups gear up for FISA surveillance fight

A controversial provision in U.S. law that gives the National Security Agency broad authority to spy on people overseas expires at the end of the year, and six major tech trade groups are gearing up for a fight over an extension. Read More

Thumbnail Image

Phishing campaign uses Yahoo breach to hook email

A phishing email sent out within hours after the Yahoo breach news broke is preys on users' concern about their account security Read More

Thumbnail Image

Personalized privacy app manages smartphone permission settings

New app designed to manage privacy settings helps consolidate and tailor user permissions. Read More

Thumbnail Image
INSIDER

ICYMI: Can you spot the phish?

A survey by Diligent caught 36 percent of users in their phishing net. Can you spot which email is the real deal? Read More

White Paper: Citrix Systems

Best Practices to Make BYOD, CYOD and COPE Simple and Secure

Define the right bring-your-own-device (BYOD), choose-your-own-device (CYOD) and corporate-owned, personally-enabled (COPE) policies for your organization, backed by complete technologies for enterprise mobility management (EMM). Read More

Top 5 Stories

1. CrowdStrike attempts to sue NSS Labs to prevent test release, court denies request
2. Cylance accuses AV-Comparatives and MRG Effitas of fraud and software piracy
3. The 7 security threats to technology that scare experts the most
4. Hot products at RSA 2017
5. How Google reinvented security and eliminated the need for firewalls

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.