What makes a good application pen test? Metrics

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Apr 05, 2017
Featured Image

Privacy rollback can cause headaches for corporate security pros

Corporate security pros can add a new task to their busy days: handling panicky employees worried about privacy who are using the onion router (Tor) browser as a way to protect their online activity. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What makes a good application pen test? Metrics
38% off Corsair Gaming SCIMITAR RGB MOBA/MMO Gaming Mouse With Key Slider Mechanical Buttons - Deal Alert
How to rescue your PC from ransomware
After political Twitter bot revelation, are companies at risk?
5 ways data classification can prevent an insurance data breach
Politicians' web browsing history targeted after privacy vote
ICYMI: The 10 essential Reddits for security pros

White Paper: Dyn Inc

2017 Internet Disruption Study

Nearly all (89%) organizations report experiencing an internet disruption in the past year. Over a third of them said it was "crippling" to their business. With a diversified network and the volatility of the internet on the rise, its time to understand where your infrastructure is most at risk and how can you build for resilience. This 2017 Spiceworks Research Report gets to the heart of the matter. Read More

Thumbnail Image

What makes a good application pen test? Metrics

Research from application security crowd testing and bug bounty program provider Cobalt attempts to define what enterprises could measure to improve results Read More

Thumbnail Image
DealPost

38% off Corsair Gaming SCIMITAR RGB MOBA/MMO Gaming Mouse With Key Slider Mechanical Buttons - Deal Alert

The Scimitar RGB gaming mouse revolutionizes game play with its Key Slider control system, 12 mechanical side buttons, and pro-proven 12,000 DPI optical sensor. It’s purpose built to deliver the ultimate MOBA and MMO gaming experience. Read More

Thumbnail Image

How to rescue your PC from ransomware

Ransomware is a serious headache. Don't negotiate with e-terrorists. Be a hero and rescue your hostage PC. Read More

Thumbnail Image

After political Twitter bot revelation, are companies at risk?

With reports of Russia using social media and bots to push fake news to influence the 2016 U.S. presidential election, questions are arising over how these same tactics could be used against an enterprise. Read More

Thumbnail Image

5 ways data classification can prevent an insurance data breach

Spirion CEO Todd Feinman offers examples of how insurance firms can leverage data classification to reduce the risk of data theft and costly compliance violations. Read More

Thumbnail Image

Politicians' web browsing history targeted after privacy vote

Two GoFundMe campaigns have raised more than US$290,000 in an effort to buy the web browsing histories of U.S. politicians after Congress voted to allow broadband providers to sell customers' personal information without their permission. Read More

Thumbnail Image

ICYMI: The 10 essential Reddits for security pros

Here, we’ve gathered 10 of the best cybersecurity Reddits so you don’t have to waste any time and can get straight to what you are looking for. Read More

eBook: Solarwinds MSP

5 Best Practices for Onboarding New Customers

With a clear plan and excellent communication, you can ensure onboarding is a positive experience for new customers and your team. Download our eBook to learn about five best practices to help you efficiently and expertly welcome your new customers, giving them the knowledge and support they need to succeed. Read More

Top 5 Stories

1. Don't pay ransoms. But if you must, here's where to buy the Bitcoins
2. Top 5 email security best practices to prevent malware distribution
3. Email security appears grounded as attacks continue to take flight
4. Hackers continue to troll LinkedIn
5. 7 sexy high-tech enterprise ‘surveillance engineer techniques that criminal hackers use

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as [email protected].

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to [email protected].