How to improve your incident response plan

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Jul 19, 2016
Featured Image

How a healthcare hacker is pressuring victims to pay up

TheDarkOverlord claims to have stolen 10 million patient records and is selling them on the black market. But in the meantime, the hacker has also been trying to extort his victims with the promise that the data will never be sold, if a ransom is paid. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to improve your incident response plan
$29.99 for the IT Security & Ethical Hacking Certification Training ($1,895 value) - Deal Alert
Why ransomware criminals need great customer service
Security software that uses 'code hooking' opens the door to hackers

White Paper: Aruba, a Hewlett Packard Enterprise company

8 Best Practices to Protect Your Enterprise Network

Mobile and IoT devices such as laptops, smartphones, and smart watches can now be found in most businesses, as users demand access to the corporate network from anywhere, anytime. Securing for BYOD is a conversation IT needs to have, but it doesn't have to be a painful one. Employ these 8 best practices to boost your network security and end those headaches for good. Read More

Thumbnail Image

How to improve your incident response plan

A well-formed, and well-tested, incident response can determine how well an organization responds to a data breach. CSO Online looks at how you can improve your own incident response plan so to reduce the impact of that data breach. Read More

Thumbnail Image

$29.99 for the IT Security & Ethical Hacking Certification Training ($1,895 value) - Deal Alert

For a limited time, the bundle of courses is only $29.99 and jam-packed with over 48 hours of courses and 50 hours of advanced training. Read More

Thumbnail Image

Why ransomware criminals need great customer service

Yes, even bad-guy malware developers have to keep their "customers" happy. Read what happens when F-Secure tests the "help desks" of four crypto-locking malware makers. Read More

Thumbnail Image

Security software that uses 'code hooking' opens the door to hackers

Code-hooking techniques used by security, performance, virtualization and other types of programs to monitor third-party processes have introduced vulnerabilities that hackers can exploit. Read More

White Paper: Aruba, a Hewlett Packard Enterprise company

A Blueprint to Unlock the Potential for Your Digital Workplace

Get the Network Blueprint for GenMobile for the tools to solve top IT challenges so you can get your network ready for the digital workplace. Read More

Top 5 Stories

1. Experts say Pokémon Go exposes players to security and privacy risks
2. Vicious new ransomware takes your money and still deletes your files
3. Apple devices held for ransom, rumors claim 40M iCloud accounts hacked
4. Killing the password: FIDO says long journey will be worth it
5. Market expansion adds to cybersecurity talent

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.