Wednesday, February 1, 2017

Are Apple-specific threats on the rise?

What IT security pros are earning in 2017

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Feb 01, 2017
Featured Image

Are Apple-specific threats on the rise?

Macs are really no more secure than a PC, but for many years there just weren't as many out there because of the expense of the hardware and other issues. They've historically been a much less popular choice among both consumers, enterprises, and hackers alike. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What IT security pros are earning in 2017
25% off Logitech Professional Presenter R800, Presentation Wireless Presenter with Laser Pointer - Deal Alert
Security execs voice concern over Trump travel ban
Report: Passwords not going away any time soon
Obama's cybersecurity legacy: Good intentions, good efforts, limited results
Report: Attack numbers fell last quarter, but attacks were more targeted and sophisticated
Cisco: Spam is making a big-time comeback

White Paper: Wombat Security

2016 Beyond the Phish Report

This report takes a look at the answers to nearly 20 million questions asked and answered around nine different security topics over the past two years to understand what areas end users still struggle with and what areas they are doing better in. Read More

Thumbnail Image
INSIDER

What IT security pros are earning in 2017

Last year was a record one for cyberattacks, and that is keeping the demand for IT security pros at an all-time high. So what should these in-demand pros be earning? Four recent salary studies offer insights on what you can expect to earn in 2017. Read More

Thumbnail Image
DealPost

25% off Logitech Professional Presenter R800, Presentation Wireless Presenter with Laser Pointer - Deal Alert

Logitech Professional Presenter R800 gives you powerful control for high-impact presentations. The brilliant green laser pointer is easy to see, even on flat panel displays, projection screens, and in brightly lit rooms. Manage your time with silent, vibrating alerts and controls that are easy to set and adjust. Move about for greater impact, with a range of up to 100 feet (30 meters) you can cover every corner of the room. Read More

Thumbnail Image

Security execs voice concern over Trump travel ban

Senior security industry professionals were concerned about the travel ban imposed this weekend by President Trump, and worried that the repercussions could go far beyond the handful of countries singled out so far. Read More

Thumbnail Image

Report: Passwords not going away any time soon

The number of passwords in use will grow from about 75 billion today to around 100 billion in 2020, according to a new report from Cybersecurity Ventures. Read More

Thumbnail Image

Obama's cybersecurity legacy: Good intentions, good efforts, limited results

President Obama declared early in his presidency that cybersecurity was a priority. Most experts agree he delivered a significant effort. But they also agree that the effort didn't deliver better security. Read More

Thumbnail Image

Report: Attack numbers fell last quarter, but attacks were more targeted and sophisticated

The total number of cybersecurity attacks fell by 35 percent in the last quarter of 2016, according to a new report, but the attacks became more targeted and sophisticated. Instead of general-purpose exploit kits and broad scanning, the attackers are zeroing in on specific targets. Read More

Thumbnail Image

Cisco: Spam is making a big-time comeback

Spam is making a surprising resurgence as a threat to corporate security and becoming a more significant carrier of attacks as varied as spear phishing, ransomware and bots, according to Cisco's 2017 Annual Cybersecurity Report. Read More

White Paper: Wombat Security

2017 State of the Phish Report

Our annual State of the Phish Report provides an overview and analysis of the latest in phishing attacks, trends, and user performance compiled from Wombat Security Education Platform data and direct feedback from hundreds of infosec professionals. Read More

Top 5 Stories

1. Details on 200,000 racing fans exposed by IndyCar
2. BMongoDB ransom attacks continue to plague administrators
3. How to eliminate insider threats
4. SonicWall CEO talks of life after Dell spinout
5. Dozens of Netgear products vulnerable to authentication bypass flaws

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:00 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive