Tuesday, January 3, 2017

How to handle business continuity in a crisis

Data breaches through wearables put target squarely on IoT in 2017

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Jan 03, 2017
Featured Image

How to handle business continuity in a crisis

IT resilience ensures business continuity in crisis, but only if executed with forethought and diligence. Todd Scallan of Axcient suggests applying any of these six tips to make IT resilient. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Data breaches through wearables put target squarely on IoT in 2017
17% off SteelSeries Nimbus Gaming Controller, Play New Minecraft Apple TV Edition - Deal Alert
Government to be more engaged with security in 2017
Changing other people's flight bookings is incredibly easy
The power grid hack that wasn't – Vermont's Burlington Electric
What the infosec jobs sector will look like in 2017
ICYMI: What 2017 has in store for cybersecurity

White Paper: F5 Networks

2016 DDoS Attack Trends

If you have been watching InfoSec headlines lately, you might think to yourself, "Hmmm, is ransomware the new DDoS?" No, DDoS is still DDoS and it's still happening. Just because the cyber-criminal underworld has added ransomware as its latest extortion tool doesn't mean that they've let go of the still lucrative, still too easy, denial-of service extortion campaigns. Read More

Thumbnail Image

Data breaches through wearables put target squarely on IoT in 2017

Security needs to be baked into IoT devices for there to be any chance of halting a DDoS attack, according to security experts. Read More

Thumbnail Image
DealPost

17% off SteelSeries Nimbus Gaming Controller, Play New Minecraft Apple TV Edition - Deal Alert

Minecraft is now on Apple TV. This Bluetooth gaming controller gives you full control. Also works for games on your Mac or other iOS devices. Its list price is currently reduced 17%. Read More

Thumbnail Image

Government to be more engaged with security in 2017

Cybersecurity will be a top priority for governments, in order to protect citizens from attacks on lifestyle. Read More

Thumbnail Image

Changing other people's flight bookings is incredibly easy

The travel booking systems used by millions of people every day lack modern authentication methods and allow attackers to easily modify other people's reservations. Read More

Thumbnail Image

The power grid hack that wasn't – Vermont's Burlington Electric

On Friday, the Washington Post reported that Russian hackers had penetrated the U.S. power grid by compromising a utility in Vermont. The story was altered, and the initial claims were eventually retracted, but by the time this happened, the news had spread to other media outlets. Read More

Thumbnail Image
INSIDER

What the infosec jobs sector will look like in 2017

Security experts believe smaller IT companies will outsource parts of their security. Read More

Thumbnail Image

ICYMI: What 2017 has in store for cybersecurity

There is much uncertainty surrounding the security industry for 2017. Many of the trepidations of experts in the field are directly connected to what the nation's next president will do. Find out what else worries them. Read More

Video/Webcast: HP Inc.

6 of 10 Companies Have Unsecured Printers. How About Yours?

Security threats are evolving every day. Even one security breach has the potential to be costly. If private information is jeopardized due to unsecured printing, the ramifications can be numerous. Join this webinar, brought to you by HP Inc., to learn how to protect your print environment from security breaches. Get your questions answered in the live Q&A session at the end of the webinar. Read More

Top 5 Stories

1. Ransomworm: the next level of cybersecurity nastiness
2. Switch from Yahoo Mail to Gmail, and turn your phone into a physical key
3. Experts split on how soon quantum computing is coming, but say we should start preparing now
4. Black market medical record prices drop to under $10, criminals switch to ransomware
5. Free security tools to support cyber security efforts

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 2:00 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive