Thursday, December 1, 2016

A year after terrorist attacks, phone privacy laws unchanged – but watch out for Trump

Security Sessions: Lessons learned from the Dyn DNS attacks

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Dec 01, 2016
Featured Image

A year after terrorist attacks, phone privacy laws unchanged – but watch out for Trump

Although the perpetrators of the San Bernardino mass shooting were killed in a gun battle with law enforcement within hours of the attack, the FBI's interest in one terrorist's iPhone precipitated a public standoff with Apple that captured its own share of national headlines. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Security Sessions: Lessons learned from the Dyn DNS attacks
Save 53% Plus an Extra $15 on Oral-B Pro 5000 Bluetooth Rechargeable Toothbrush - Deal Alert
5 ways data classification can prevent an education data breach
Report: Only 6% of businesses use DMARC email authentication, and only 1.5% enforce it
Scholars, infosec experts call for action on Russian hacking
ICYMI: 10 top holiday phishing scams

White Paper: Avaya-Windstream

5 Ways to Get Work Done Faster

Avaya Equinox redefines UC to make it a natural part of how we connect, communicate and collaborate. Read More

Thumbnail Image
Video

Security Sessions: Lessons learned from the Dyn DNS attacks

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with Stephen Boyer, CTO and co-founder of BitSight, about the recent DNS attacks against Dyn, and how CSOs can prepare their systems against future attacks. Watch Now

Thumbnail Image
DealPost

Save 53% Plus an Extra $15 on Oral-B Pro 5000 Bluetooth Rechargeable Toothbrush - Deal Alert

Bluetooth between brush and smartphone provides real-time feedback on brushing habits. Floss Action round brush head with micropulse bristles and 3D cleaning action for a superior clean. The brush is 53% off on Amazon, where you'll also find a $15 coupon to be applied at checkout. Read More

Thumbnail Image

5 ways data classification can prevent an education data breach

Spirion CEO Jo Webber offers examples of how the education vertical can leverage data classification to reduce the risk of data theft and costly compliance violations. Read More

Thumbnail Image

Report: Only 6% of businesses use DMARC email authentication, and only 1.5% enforce it

In a study of 1 million corporate domains, only 60,000 had made any attempt at DMARC email authentication, and of those, only a quarter actually had enforcement mechanisms in place. Read More

Thumbnail Image

Scholars, infosec experts call for action on Russian hacking

In the wake of reports about Russian involvement in fake news and hacks against political targets leading up to the recent presidential election, scholars and security experts are calling for federal action Read More

Thumbnail Image

ICYMI: 10 top holiday phishing scams

It always happens this time of year, an influx of holiday-related scams circulating the interwebs. Scams don't wait for the holidays, but scammers do take advantage of the increased shopping and distraction when things get busy to take your money and personal information. Here are a six holiday threats to watch out for. Read More

White Paper: Avaya-Windstream

7 Reasons Businesses Are Moving To The Cloud

What are your considerations for moving to the cloud? According to a special report by Frost & Sullivan, businesses like yours are increasingly transitioning to cloud communication architectures such as Unified Communications as a Service (UCaaS). In fact, business adoption of hosted IP telephony and UCaaS is expected to steadily expand by about 25-30% year over year. Read More

Top 5 Stories

1. Ransomware forces SFMTA to give free rides, $73,000 demanded by attackers
2. 10 top holiday phishing scams
3. SF MUNI hacker lashes out, threatens to release 30GBs of compromised data
4. Best practices to fight corporate security risks
5. Feds provide legal loophole to hacking IoT devices

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 2:00 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive