Thursday, February 23, 2017

7 Wi-Fi vulnerabilities beyond weak passwords

How the DOT discovered its network was compromised by shadow IT

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Feb 23, 2017
Featured Image
INSIDER

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you're not exposed in these other ways. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How the DOT discovered its network was compromised by shadow IT
50% off Dell UltraSharp U3415W PXF79 34-Inch Curved LED-Lit Monitor
5 ways to spot a phishing email
Cybersecurity: What does the board want?
And the Oscar goes to… Cybersecurity!
9 new hacks coming to get you
'Tis the season to watch out for W-2 phishing scams

White Paper: GE Power

2017: Top Digital Trends for the Electricity Value Network

Read about the 2017 top digital trend predictions for the power and utility industry, and gain a competitive edge by understanding what's next. Across the Electricity Value Network (EVN) - from generation through T&D and end user management, first movers and proactive digital adopters are far more likely to thrive in the future. Read More

Thumbnail Image

How the DOT discovered its network was compromised by shadow IT

Finding of hundreds of pieces of unauthorized networking equipment, including many off-the-shelf consumer-grade devices, compelled the Department of Transportation CIO to alert department leadership and launch a rearchitecture of the network. Read More

Thumbnail Image
DealPost

50% off Dell UltraSharp U3415W PXF79 34-Inch Curved LED-Lit Monitor

This 34-inch 21:9 curved monitor with a panoramic view, cinematic WQHD resolution and rich sound is discounted 50% making this a solid deal on the U3415W. Read More

Thumbnail Image

5 ways to spot a phishing email

Think you're clever enough to recognize a phishing attempt? Think again. Cybercriminals are getting smarter and their phishing skills are getting better, but we've put together this list of clues to help you avoid a costly error. Read More

Thumbnail Image

Cybersecurity: What does the board want?

Summary of the 2017 NACD Cyber-risk Handbook and its recommendations for directors. Action items for CISOs. Read More

Thumbnail Image

And the Oscar goes to… Cybersecurity!

Imagine if the Oscars' categories applied to cybersecurity. Read More

Thumbnail Image

9 new hacks coming to get you

The proliferation of insecure devices in every facet of our lives will have consequences far beyond the digital realm Read More

Thumbnail Image

'Tis the season to watch out for W-2 phishing scams

Earlier this month, the IRS sent out an urgent alert warning employers that this W-2 phishing scam had spread beyond the corporate world to other sectors, including school districts, tribal organizations and nonprofits Read More

eBook: Silver Peak Systems Inc

2017 Trends: SD-WAN Advances Towards Mainstream Adoption

As SD-WAN adoption continues to gain ground and go mainstream in 2017, the majority of initial enterprise deployments will be hybrid, leveraging both MPLS and a complement of broadband connectivity. Many enterprises already have some level of broadband connectivity to branch and remote locations, but these links often remain idle or are relegated to backup or disaster recovery (DR). Read More

Top 5 Stories

1. CrowdStrike attempts to sue NSS Labs to prevent test release, court denies request
2. Cylance accuses AV-Comparatives and MRG Effitas of fraud and software piracy
3. Vendors respond to Cylance's new testing methods with AV-TEST
4. Phishing campaign uses Yahoo breach to hook email
5. Salted Hash: RSA Conference 2017 – Live Blog

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 4:01 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive