How to strike ransomware out

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

May 08, 2017
Featured Image

What's the key to surviving as a cyber-security start-up?

It’s always a gamble to establish a start-up, but if you were to choose any sector where you’d fancy your chances of success, it would surely be cyber-security. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to strike ransomware out
25% off YETI Rambler 20 oz Stainless Steel Vacuum Insulated Tumbler with Lid - Deal Alert
Resiliency, staying afloat in the face of cyber threats
China's spy hunting tactics
Third parties leave your network open to attacks
Pitfalls of identity access management
ICYMI: How to prevent your mobile app from getting hacked

White Paper: Cybereason

2017 Threat Hunting Survey Report

Many organizations realize that threat hunting is the next step in the evolution of the modern Security Operations Center (SOC). To gain more insights on the state of threat management in SOCs, Cybereason commissioned an online survey of over 330 cybersecurity and IT professionals. Read More

Thumbnail Image

How to strike ransomware out

Carbonite created this list of 10 important ransomware prevention tips and best practices. Read More

Thumbnail Image
DealPost

25% off YETI Rambler 20 oz Stainless Steel Vacuum Insulated Tumbler with Lid - Deal Alert

The Rambler 20 oz. bottle is next-level, and the perfect addition to your rough commutes, day hikes, or kayak sessions. Features a no-sweat design and tough 18/8 stainless steel construction. Yeti has over-engineered these double-wall insulated tumblers to ensure your drink still keeps its temperature no matter how much of a beating this cup takes. Read More

Thumbnail Image

Resiliency, staying afloat in the face of cyber threats

Today's reality is that if the enterprise uses networked computers, they will get hit at some point. Not having and practicing a recovery plan could be the doom of any organization. Read More

Thumbnail Image

China's spy hunting tactics

China’s counterintelligence capabilities continue to evolve. The newest arrow in their quiver to detect those who are breaking trust with Mother China is the “bounty” for identification of “suspicious foreigners.” Read More

Thumbnail Image

Third parties leave your network open to attacks

With the Target example as the high-water mark, enterprises need to worry about the lack of security on a third parties’ part. How do you tighten things up? Read More

Thumbnail Image

Pitfalls of identity access management

Whether dealing with a third parties access or tracking an insider through your network, action needs to be take to see who goes where. Too few organizations treat IAM as the crucial, secure connective tissue between businesses' multiplying employees, contractors, apps, business partners and service providers. Read More

Thumbnail Image

ICYMI: How to prevent your mobile app from getting hacked

TriviaCrack may be addicting to users, but criminals are hooked on getting your personal information from other apps you use Read More

White Paper: GreenPages Technology Solutions

5 Best Practices To Make Security Everyone's Business

Menaced by an ever-expanding array of increasingly potent threats, today's highly mobile employees are frontline participants in the struggle to secure the enterprise. So while solid security strategies must include smart policies, rigorous enforcement, and deep monitoring/ reporting, they must also reflect the needs and habits of the company's users. Read More

Top 5 Stories

1. Making sense of cybersecurity qualifications
2. Third parties leave your network open to attacks
3. Job seekers beware of recruiters
4. Recent Google Docs Phishing attack is a win for Blue Teams
5. What's the key to surviving as a cyber-security start-up?

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.