Hillary Clinton might have been a pretty good president had she used Pretty Good Privacy

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Nov 16, 2016
Featured Image

Is critical infrastructure the next DDoS target?

DDoS attacks are vastly bigger now, thanks to botnets composed of Internet of Things devices. A recent attack that took down a portion of the internet has led to questions about whether something similar could shut down critical infrastructure. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Hillary Clinton might have been a pretty good president had she used Pretty Good Privacy
29% off Hubsan X4 RC Quad Copter with Camera - Deal Alert
US lawmakers balk at call for IoT security regulations
How to prepare for a data breach
Cybersecurity is everyone’s responsibility – and it starts at the top
Akamai: Look for IoT devices to attack during Thanksgiving, Christmas
ICYMI: Darkweb marketplaces can get you more than just spam and phish

Downloadable Asset: ProtectWise

5 Blind Spots That Kill Cybersecurity

One of the most difficult and endemic problems facing cybersecurity departments today is security's 'you don't know what you don't know syndrome.' All too often, information security practitioners are tasked with responding to incidents on their network that they may not even know exist until they've already become full-fledged breaches. Read More

Thumbnail Image

Hillary Clinton might have been a pretty good president had she used Pretty Good Privacy

Had Presidential candidate Hillary Clinton employed basic email security techniques, she’d be President-elect. Read More

Thumbnail Image
DealPost

29% off Hubsan X4 RC Quad Copter with Camera - Deal Alert

For the currently discounted price of just $37, the X4 from Hubsan is a pretty respectable quadcopter. It's extremely easy to fly, with a 6-axis flight control system and adjustable gyro sensitivity. It features a camera as well. Perfect for a beginner, but fun for the expert as well. Read More

Thumbnail Image

US lawmakers balk at call for IoT security regulations

The U.S. government needs to pass regulations mandating internet of things security measures before device vulnerabilities start killing people, one security expert told lawmakers. Read More

Thumbnail Image

How to prepare for a data breach

Tips and tricks for preparing a data breach response plan Read More

Thumbnail Image

Cybersecurity is everyone’s responsibility – and it starts at the top

Cybersecurity is a problem that every level in an organization faces, one that goes well beyond the purview of a Chief Security Officer. Leadership and all members of the executive management team must be committed, and that commitment must radiate throughout every level of every department. This commitment to cybersecurity issues must be a part of company culture, and the leadership of that culture starts with the highest levels of leadership who need to lead by example. Read More

Thumbnail Image

Akamai: Look for IoT devices to attack during Thanksgiving, Christmas

The annual holiday uptick in denial of service attacks will likely continue this year only this time with a new devastating weapon: Internet of Things (IoT) devices, according to Akamai. Read More

Thumbnail Image

ICYMI: Darkweb marketplaces can get you more than just spam and phish

Underground markets offer a great variety of services for cyber criminals to profit from. These forums offer items ranging from physical world items like drugs and weapons to digital world items such as spam/phishing delivery, exploit kit services, "Crypters", "Binders", custom malware development, zero-day exploits, and bulletproof hosting. Read More

White Paper: Curvature

Curvature Empowers Healthcare Company to Boost Operational Efficiency

The healthcare industry remains at the forefront when it comes to making a major impact on improving health outcomes. The same is true for a clinical lab leader that provides diagnostic information services to millions of patients and physicians from thousands of patient locations and dozens of clinical labs around the world. Read More

Top 5 Stories

1. Hacker shows how easy it is to take over a city’s public Wi-Fi network
2. 412 million FriendFinder accounts exposed by hackers
3. 12 steps to lower your espionage risk
4. Why senior managers are the most dangerous negligent insiders
5. This malware attack starts with a fake customer-service call

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.