Detecting insider threats is easier than you think

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Apr 13, 2017
Featured Image
INSIDER

How CISOs can explain privacy to the C-suite

With the recent moves by the FCC, it is imperative that chief security officers make the company aware of privacy issues. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Detecting insider threats is easier than you think
14% off APC 11-Outlet Surge Protector with USB Charging Ports and SurgeArrest - Deal Alert
Can AI and ML slay the healthcare ransomware dragon?
InfoSec pros feel less external pressure, take security more personally
FCC privacy ruling could leave enterprises' data vulnerable
ICYMI: 7 tips to strengthen online security

White Paper: Red Hat

A Platform for Modernizing Java Applications: Designing workloads for the cloud and modern ecosystems

Organizations are at a strategic crossroads. According to IDC analysts, two-thirds of CEOs will center corporate strategies around digital transformation initiatives. The goal of digital transformation is partly to do existing functions more effectively. The greater goal is to be able to do new things or better use existing data in new ways. Read More

Thumbnail Image

Detecting insider threats is easier than you think

Security experts weigh in on stopping the danger from your own employees. Access and security awareness training are the main themes to finding the danger that is within your own walls. Read More

Thumbnail Image
DealPost

14% off APC 11-Outlet Surge Protector with USB Charging Ports and SurgeArrest - Deal Alert

Be it a lightning strike that destroys a home entertainment center or fluctuating power that degrades the life of your electronics – surges, lightning, and power disturbances can have a devastating impact on the valuable electronics you rely on every day. The P11U2 offers guaranteed surge protection. Read More

Thumbnail Image

Can AI and ML slay the healthcare ransomware dragon?

Healthcare is well known as “low-hanging fruit” for ransomware attacks. But according to some experts, artificial intelligence and machine learning, as part of a “layered” security program, can make them a much more difficult target. Read More

Thumbnail Image

InfoSec pros feel less external pressure, take security more personally

Security professionals are feeling less pressure from management, less pressure to approve IT projects early, and are less worried about emerging technologies, according to a survey released this morning. But they are also putting more pressures on themselves. Read More

Thumbnail Image

FCC privacy ruling could leave enterprises' data vulnerable

The recent repeal of new FCC rules designed to strengthen personal privacy among consumers by limiting the uses ISPs can make of their personal data also has implications for companies who use these services. Security and privacy owners should consider the impacts of data collection on the enterprise, and look for ways to protect themselves. Read More

Thumbnail Image

ICYMI: 7 tips to strengthen online security

If you are online today, checking email, buying someone a gift, posting to Facebook, paying bills, streaming Netflix, or monitoring your sleeping baby, you need to practice these seven tips for protecting your online presence. Read More

Video/Webcast: Dyn

Delivering On the Promise of Omnichannel Digital Performance

In today's omnichannel environment, the digital experience you deliver through your sites and applications is your user experience.. Now, more than ever, brands from retailers to banks rely heavily on the performance of their website to compete, win customers, and ultimately drive repeat sales. Read More

Top 5 Stories

1. John McAfee kicked off NYSE stage at Cyber Investing Summit due to security concerns
2. Predictive analytics can stop ransomware dead in its tracks
3. nfosec careers: There is no one true path
4. Angry Shadow Brokers release password for suspected NSA hacking tools
5. Scottrade Bank data breach exposes 20,000 customer records

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as [email protected].

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to [email protected].