How security leaders need to fix the security industry skills shortage

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Nov 15, 2016
Featured Image
INSIDER

When selling a smart home, follow these security tips

Recently, one of our neighbors sold their home and they had a Google Nest thermostat. This became an issue during the sale process. The prospective buyers wanted the Nest to remain, but current owners wanted to take it with them. This brought up the question of whether the Nest was considered like a major appliance and was part of the home. Or was it more like the furniture, which moves to the next residence with the original owners. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How security leaders need to fix the security industry skills shortage
27% off All-New Echo Dot and WeMo Smart Plug Bundle - Deal Alert
12 steps to lower your espionage risk
This malware attack starts with a fake customer-service call
How automated investigation can accelerate threat detection
ICYMI: Darkweb marketplaces can get you more than just spam and phish

White Paper: IBM Corporation

API Use Case

Software is eating the world. It's a phrase that is becoming increasingly popular with a large number of organisations-and it's true. Look around. Hundreds of new mobile apps appear on a daily basis. These apps are not just about games and entertainment, many target the consumer and the business to business (B2B) segment. The explosion in mobile apps has come about through a series of shifts in how software is architected and designed. Read More

Thumbnail Image

How security leaders need to fix the security industry skills shortage

Shai Gabay offers some practical steps each security leader can follow to attract and hire the right people to help ease the security industry skills shortage Read More

Thumbnail Image
DealPost

27% off All-New Echo Dot and WeMo Smart Plug Bundle - Deal Alert

Wemo is home automation the easy way: Just plug in a Wemo Switch and start controlling your lights and appliances from anywhere in the world. Pair it with Echo Dot for the power of voice control. Right now if you buy both items together, you save 27%. Read More

Thumbnail Image
INSIDER

12 steps to lower your espionage risk

Corporate espionage is the domain of companies that steal information to gain competitive advantage. Here's how to take the target off your back. Read More

Thumbnail Image

This malware attack starts with a fake customer-service call

Hotel and restaurant chains, beware. A notorious cybercriminal gang is tricking businesses into installing malware by calling their customer services representatives and convincing them to open malicious email attachments. Read More

Thumbnail Image

How automated investigation can accelerate threat detection

Cyber security analysts are overwhelmed with the pressure of keeping their companies safe. Here’s what you need to consider when adopting an automated investigation environment. Read More

Thumbnail Image

ICYMI: Darkweb marketplaces can get you more than just spam and phish

Underground markets offer a great variety of services for cyber criminals to profit from. These forums offer items ranging from physical world items like drugs and weapons to digital world items such as spam/phishing delivery, exploit kit services, "Crypters", "Binders", custom malware development, zero-day exploits, and bulletproof hosting. Read More

White Paper: SAP

BARC Paper: The Benefits of an Integrated Approach to BI and Planning

Read why the integration of BI and Planning in one common software platform is a means of avoiding problems and user dissatisfaction in BI and Planning processes. Read More

Top 5 Stories

1. Researcher says Adult Friend Finder vulnerable to file inclusion vulnerabilities
2. Why senior managers are the most dangerous negligent insiders
3. 412 million FriendFinder accounts exposed by hackers
4. There’s a war on for cybersecurity talent
5. Microsoft patches 68 vulnerabilities, two actively exploited ones

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.