Thursday, September 22, 2016

Security is no fiction: Infosec on TV, film—and in space

Investigating Cybersecurity Incidents — a free course

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Sep 22, 2016
Featured Image

Security is no fiction: Infosec on TV, film—and in space

Has film and TV depiction of IT security gotten any better since the '80s? We quizzed some tech pros hear their favorites and learn about the worst offenders. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Investigating Cybersecurity Incidents — a free course
56% off Cambridge SoundWorks OontZ Angle 3XL Water Resistant Wireless Bluetooth Speaker - Deal Alert
How to harden Windows 10 for maximum security
Over 6,000 vulnerabilities went unassigned by MITRE's CVE project in 2015
CISOs shouldn't wait until retirement for social security
Security's new training center, a first of its kind
As migration anniversary approaches, only a third of retailers accept chip cards

Research/Infographic: Citrix Systems

2016 Gartner Magic Quadrant for Enterprise Mobility Management Suites

The enterprise mobility landscape is changing and you need a solution that has you covered no matter what the future brings. Read the report to find out why Citrix has been named a leader. Read More

Thumbnail Image
INSIDER

Investigating Cybersecurity Incidents — a free course

Training provider Logical Operations offers a free online course on how to collect, preserve and analyze evidence from cybersecurity incidents — and prepare for the court case. Read More

Thumbnail Image
DealPost

56% off Cambridge SoundWorks OontZ Angle 3XL Water Resistant Wireless Bluetooth Speaker - Deal Alert

Blast your music with the loud, powerful sound of the Angle 3XL. High quality stereo sound, incredible volume, powerful bass, IPX5 water resistance and built-in mic for hands-free speakerphone. Read More

Thumbnail Image

How to harden Windows 10 for maximum security

To make the most of Windows 10's security improvements, you must target the right edition and hardware for your needs Read More

Thumbnail Image

Over 6,000 vulnerabilities went unassigned by MITRE's CVE project in 2015

In 1999, MITRE created the Common Vulnerabilities and Exposures (CVE) database as a way to standardize the naming of disclosed vulnerabilities. As it stands now, the CVE system is faced with bottlenecks and coverage gaps, as thousands of vulnerabilities go without CVE-ID assignments. Read More

Thumbnail Image

CISOs shouldn't wait until retirement for social security

A security industry expert says CISOs should be responsible for cyber defending the social media accounts belonging to employees at their organizations... and they should be doing it now. Read More

Thumbnail Image

Security's new training center, a first of its kind

Maryland's Department of Commerce in partnership with other technology partners launches first standalone cybersecurity training center in the U.S. Read More

Thumbnail Image

As migration anniversary approaches, only a third of retailers accept chip cards

Retailers were supposed to start accepting chip cards last October, but a year past the start of the EMV liability shift, two-thirds still haven't done so. Read More

White Paper: Masergy Communications Inc.

4 Criteria for Selecting a Global Network Provider

A global network is a company's central nervous system that influences the overall health and performance of a business and its critical systems. The success of your business - and your business applications depends on it! Read More

Top 5 Stories

1. Zero-percent cybersecurity unemployment, 1 million jobs unfilled
2. Investment fund loses $6 million in BEC scam, suspends operations
3. The only three passwords your survivors will ever need
4. The future of passwords is no more passwords
5. Pokémon Go guide app with half a million downloads hacks Android devices

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 2:00 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive