How to clean up security vulnerabilities with better cyber hygiene

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Apr 10, 2017
Featured Image

What enterprises can learn in the aftermath of a phishing attack

Tychon’s Chief Technology Officer Travis Rosiek offers tips for enterprises on how to analyze former phishing attacks to improve defenses against future attacks, such as creating a database of captured phishing emails to learn tactics, who is being targeted and what information was used for social engineering. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to clean up security vulnerabilities with better cyber hygiene
35% off Universal Waterproof Dry Phone Bag for Devices, 3-Pack - Deal Alert
Prevent or detect? What to do about vulnerabilities
Robots: Lots of features, not much security
Infosec careers: There is no one true path
What it takes to become an application security engineer
ICYMI: 7 tips to strengthen online security

White Paper: OpenText

10 Strategies to Navigate the Shift from ECM to Content Services

Read this AIIM ebook to get a list of action items that will help you make the transition to content services. Read More

Thumbnail Image

How to clean up security vulnerabilities with better cyber hygiene

One of the more neglected aspects of network security is people. Just as we grew up learning good personal hygiene practices, we are now obligated to teach similar practices among the users of our networks to prevent cyber attacks and data breaches. Read More

Thumbnail Image
DealPost

35% off Universal Waterproof Dry Phone Bag for Devices, 3-Pack - Deal Alert

Waterproof bag securely protects all smartphones from water, dust and dirt. Great for using during outdoor activities including boating boating and swimming. Read More

Thumbnail Image

Prevent or detect? What to do about vulnerabilities

A good security program includes prevention, detection, and response, so security practitioners need to focus on the vulnerabilities that matter. Read More

Thumbnail Image

Robots: Lots of features, not much security

Robotics is one of the fastest-growing components of the IoT. It can also be one of the more dangerous, if taken over by hackers. And given the level of vulnerabilities in them, that is a clear and present risk. Read More

Thumbnail Image

Infosec careers: There is no one true path

It would sure make things simple if there were one easy and obvious way to get a job or start a successful business in IT security. But it would also cut off a lot of potential career paths. We spoke to a host of different IT security pros and found that indeed there wasn't just one route to that coveted job. Read More

Thumbnail Image
INSIDER

What it takes to become an application security engineer

Application security engineers earn more money than application engineers and are in high demand, but the job requires additional training in security. Read More

Thumbnail Image

ICYMI: 7 tips to strengthen online security

If you are online today, checking email, buying someone a gift, posting to Facebook, paying bills, streaming Netflix, or monitoring your sleeping baby, you need to practice these seven tips for protecting your online presence. Read More

White Paper: Smartling

7 Symptoms in a Broken Translation Process

Thousands of broken translation processes go undiagnosed each year. It's not like translation teams haven't felt the pain, however. Many limp through their review cycles, wince at the sight of their invocies, and cringe with every correction request. The real issue is an inability to determine what's causing the pain - and the prevailing sense that what they're feeling isn't all that serious. Read More

Top 5 Stories

1. Infosec careers: There is no one true path
2. Scottrade Bank data breach exposes 20,000 customer records
3. Hiding in plain sight — 4 places to find cybersecurity talent in your own organization
4. Scammers Phishing for financial credentials on Twitter
5. Report: 30% of malware is zero-day, missed by legacy antivirus

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.