Tuesday, November 29, 2016

Hiring the hidden gems: Should InfoSec hire from other industries?

Feds provide legal loophole to hacking IoT devices

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Nov 29, 2016
Featured Image
INSIDER

Hiring the hidden gems: Should InfoSec hire from other industries?

The information security industry is in desperate need of skilled personnel. But, as CSO investigates, some of those professionals could potentially be sourced from other industries. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Feds provide legal loophole to hacking IoT devices
Save on Steam Gaming Gear With These Active Discounts - Deal Alert
DHS helps you make your control systems more secure
Measuring what matters in cybersecurity
SF MUNI starts to restore systems, says no data compromised during attack
Senators plan last-ditch push to curb US law-enforcement hacking power
ICYMI: 10 top holiday phishing scams

White Paper: DOUBLE-TAKE

2016 State of Resilience Report

Today's IT world is exploding with volumes of data and pressure to fulfill corporate expectations of near-continuous uptime. In this 8th Annual State of Resilience Report, Vision Solutions reviews how IT professionals around the globe evaluate their business environment, determine the best tools and ensure system-wide resilience. A review of our 2015 research will give you statistics, trends and insight into the state of IT systems world-wide. Read More

Thumbnail Image

Feds provide legal loophole to hacking IoT devices

For the next two years, "good-faith" security researchers will be allowed to hack into the software of most Internet of Things devices without risk of violating copyright laws. Whether that will lead to more cooperation or confrontation remains to be seen. Read More

Thumbnail Image
DealPost

Save on Steam Gaming Gear With These Active Discounts - Deal Alert

If you're into Steam Gaming, or know somebody who is, you should consider these deals currently active on Steam gear. Read More

Thumbnail Image

DHS helps you make your control systems more secure

After a zero-day exploit to the maritime transportation sector, DHS's National Cybersecurity and Communications Integration Center notified potentially-affected U.S. ports about the threat. They described the apparent vulnerability and provided preliminary mitigation measures. Read More

Thumbnail Image

Measuring what matters in cybersecurity

We have more data than we need and we actually need far less than we think. We could begin by simply making better bets, says Richard Seiersen. It's time to awaken the statistical ninja inside our security teams. Read More

Thumbnail Image

SF MUNI starts to restore systems, says no data compromised during attack

Focusing on the most critical systems first, the agency responsible for MUNI says IT teams are in the middle of their BCDR process this morning. The IT staff jumped into action after a ransomware attack forced some systems offline during the Thanksgiving holiday weekend. The agency also says that claims of data exfiltration by the attacker are false. Read More

Thumbnail Image

Senators plan last-ditch push to curb US law-enforcement hacking power

Unless Congress takes 11th-hour action, the FBI and other law enforcement agencies will gain new authority this week to hack into remote computers during criminal investigations. Read More

Thumbnail Image

ICYMI: 10 top holiday phishing scams

It always happens this time of year, an influx of holiday-related scams circulating the interwebs. Scams don't wait for the holidays, but scammers do take advantage of the increased shopping and distraction when things get busy to take your money and personal information. Here are a six holiday threats to watch out for. Read More

Research/Infographic: A10 Networks

4 Reasons You Need a High Performance ADC

The Internet of Things (IoT) will enable all types of devices to connect, increasing bandwidth demands. Read More

Top 5 Stories

1. Ransomware forces SFMTA to give free rides, $73,000 demanded by attackers
2. Voting security experts call on Clinton to demand recount
3. 10 top holiday phishing scams
4. Malicious images on Facebook lead to Locky Ransomware
5. U.S. says cybersecurity skills shortage is a myth

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 2:00 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive