Wednesday, April 20, 2016

Hacking Team postmortem is something all security leaders should read

19 open source GitHub projects for security pros

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Apr 20, 2016
Featured Image

Hacking Team postmortem is something all security leaders should read

Hacking Team is back in the news again. Last weekend, the person responsible for Hacking Team's meltdown posted a recap of the incident, including a detailed overview of how they hacked the Italian firm. It's a fascinating read on its own, but the postmortem should be essential reading for anyone that supports or manages a security program. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

19 open source GitHub projects for security pros
What to do when Locky strikes
These CISOs explain why they got fired
Google: Android security is stronger than ever
Outdated Git version in OS X puts developers at risk

White Paper: Software AG Inc

Adaptive Applications: The Fastest Way to Become a Digital Business

Making the digital transformation requires a new approach to application development - traditional methods are often too slow and rigid to handle the speed of business. Read More

Thumbnail Image
INSIDER

19 open source GitHub projects for security pros

GitHub has a ton of open source options for security professionals, with new entries every day. Add these tools to your collection and work smarter Read More

Thumbnail Image

What to do when Locky strikes

A friend's company is hit with aggressive ransomware and calls our manager for advice. Read More

Thumbnail Image

These CISOs explain why they got fired

CISOs explain why, fair or not, they were let go by their company. Read More

Thumbnail Image

Google: Android security is stronger than ever

The company scanned 6 billion apps per day in the last year as part of its effort to secure Android's far-flung landscape. Read More

Thumbnail Image

Outdated Git version in OS X puts developers at risk

The OS X command line developer tools include an old version of the Git source code management system that exposes Mac users to remote code execution attacks. Read More

White Paper: Teradata

Analytics in the Cloud: Five Components for Success

Cloud solutions have arrived and are here to stay. Innovative companies are reviewing their data management strategies to identify where and how cloud implementations should play a role. Read More

Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 2:00 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive