A CISO’s guide to avoiding certain CISO jobs

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Feb 09, 2017
Featured Image

Why the CSO needs to be involved in active shooter prep

All security managers, especially those charged with physical security responsibilities, need to be involved in emergency prep for varying scenarios - including the potential for an active shooter on scene. Imad Mouline, CTO at Everbridge, fills us in on the essentials for these plans. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

A CISO’s guide to avoiding certain CISO jobs
38% Apple USB-C Digital AV Multiport Adapter - Deal Alert
The flaw in applying culture to awareness programs
Criminals release fewer new types of malware last year, double down on ransomware
Have you seen her resume? 12 amazing women in security
Teenage hackers beware: Don't do the cybercrime if you can't do the jail time
Study: 1 in 3 website visitors is an attack bot

White Paper: CloudShare

51 Best Practices to Optimize Your Customer Software Training

In the enterprise software business, the effectiveness of your customer software training is all-important to your bottom line. Our new eBook, How to Optimize Your Customer Software Training: 51 Best Practices to Achieve New Levels of Performance, presents a detailed review of the many areas you need to master to maximize product adoption and customer success. Read More

Thumbnail Image

A CISO’s guide to avoiding certain CISO jobs

Some Chief Information Security Officer (CISO) jobs are unwanted security executive positions that might not be good for your career. If you are looking for a new CISO position, you may want to know what type of CISO position a company is really looking for. So many CISO positions are just a bad fit for a candidate. Read More

Thumbnail Image
DealPost

38% Apple USB-C Digital AV Multiport Adapter - Deal Alert

Connect your MacBook with USB-C port to an HDMI display, while also connecting a standard USB device and a USB-C charging cable. Read More

Thumbnail Image

The flaw in applying culture to awareness programs

I appreciate that organizations are beginning to realize that they need to understand their corporate culture in their implementation of awareness programs. It is long overdue. Unfortunately as a concept, it is being grossly misapplied. In short, you don’t want to adhere to culture, you want to improve culture. Read More

Thumbnail Image

Criminals release fewer new types of malware last year, double down on ransomware

Cybercriminals have been producing fewer new kinds of malware last year -- but that's because they're so busy raking in the money from their ransomware attacks. The number of unique malware samples discovered last year was 60 million, down 6.25 percent from last year's 64 million. The total number of malware attack attempts also fell, from 8.2 billion to 7.9 billion. This was also the first year that the company has seen attack attempts fall. Read More

Thumbnail Image

Have you seen her resume? 12 amazing women in security

A look at some impressive women who've advanced in security roles. Read More

Thumbnail Image

Teenage hackers beware: Don't do the cybercrime if you can't do the jail time

Some teenagers are learning the hard way that cybercrime doesn't pay. Read More

Thumbnail Image
INSIDER

Study: 1 in 3 website visitors is an attack bot

And 94.2 percent of 100,000 inspected websites experienced at least one bot attack during a 90-day survey period. Read More

White Paper: Intel Corporation

A No-Tradeoff Path to Cloud Transformation

Many believe the cloud presents a clear path to digital transformation however, many struggle to find the balance between flexibility, performance and cost efficiency. With the business climate moving at such a rapid pace, companies are finding technology that scales to deal with the fluctuating market and customer or workload demands. Read More

Top 5 Stories

1. 29,000 taxpayers affected by W-2 scams, IRS issues new warning
2. The security theory and troubling practice behind the TSA's Pre-check security lines
3. Malware distributors are switching to less suspicious file types
4. Can you spot the phish?
5. How AI is stopping criminal hacking in real time

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.