



<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://search.yahoo.com/mrss/">
	<channel>
		<title>CSO Online</title>
		<link>http://www.csoonline.com</link>
		<description></description>
		<language>en-us</language>
		<pubDate>Mon, 17 Jul 2017 10:08:13 -0700</pubDate>
		<lastBuildDate>Mon, 17 Jul 2017 10:08:13 -0700</lastBuildDate>
		
			<image>
				<url>http://idge.staticworld.net/cso/cso510x510.png</url>
				<title>CSO Online</title>
				<link>www.csoonline.com</link>
				<width>510</width>
				<height>510</height>
			</image>
		
		
			<image>
				<url>http://idge.staticworld.net/cso/cso798x288.png</url>
				<title>CSO Online</title>
				<link>www.csoonline.com</link>
				<width>796</width>
				<height>288</height>
			</image>
		
		

	
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
			
		
		
	<item>

		<title>Cybersecurity Operations:  More Difficult Than It Was 2 Years Ago</title>

		<pubDate>Mon, 17 Jul 2017 07:46:00 -0700</pubDate>

		
		
		
		<author>Jon Oltsik</author>
		<dc:creator>Jon Oltsik</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>ESG just published a new research report titled, <em>Cybersecurity Analytics and Operations in Transition, </em>based upon a survey of 412 cybersecurity and IT professionals working at large mid-market (i.e. 500 to 999 employees) and enterprise (i.e. more than 1,000 employees) organizations in North America and Western Europe (note:  I am an ESG employee). </p><p>The data is quite interesting to say the least so look for lots of blogs from me over the next few weeks on a myriad of security operations topics we covered in this project.  Furthermore, my esteemed colleague Doug Cahill and I are hosting a webinar this Wednesday, July 19, feel free to attend, more details can be found <a href="http://www.esg-global.com/webinar-security-analytics-and-operations-problems-and-solutions">here</a>. </p><p class="jumpTag"><a href="/article/3208074/security/cybersecurity-operations-more-difficult-than-it-was-2-years-ago.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3208074/security/cybersecurity-operations-more-difficult-than-it-was-2-years-ago.html#tk.rss_all</link>
		
		
		
		
		
		
		

		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Network Security</category>
					
				
				
					
						<category>Endpoint Protection</category>
					
				
				
					
						<category>Cloud Security</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
			
		
		
	<item>

		<title>Elon Musk’s top cybersecurity concern: Preventing a fleet-wide hack of Teslas</title>

		<pubDate>Mon, 17 Jul 2017 07:40:00 -0700</pubDate>

		
		
		
		<author>Ms. Smith</author>
		<dc:creator>Ms. Smith</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>“AI is a fundamental, existential risk for human civilization,” Tesla and Space X CEO <a href="https://youtu.be/2C-A797y8dA" target="_blank">Elon Musk said</a> at the National Governors Association summer meeting. He doesn’t think people “fully appreciate that.” AI and a possible robot apocalypse is just one topic covered by Musk, and we’ll get back to that; but since a Tesla is “like a laptop on wheels,” Musk also talked about his top cybersecurity concern: a fleet-wide hack of Teslas.</p><p>“I think one of the biggest risks for autonomous vehicles is somebody achieving a fleet-wide hack,” Musk said in response to a question from North Dakota Governor Doug Burgum. “In principle, if somebody was able to hack, say, all of the autonomous Teslas, they could, say—I mean just as a prank—they could say like ‘send them all to Rhode Island’ from across the United States. And that would be like, well OK, that would be the end of Tesla. And there would be a lot of angry people in Rhode Island, that’s for sure.”</p><p class="jumpTag"><a href="/article/3208035/security/elon-musk-s-top-cybersecurity-concern-preventing-a-fleet-wide-hack-of-teslas.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3208035/security/elon-musk-s-top-cybersecurity-concern-preventing-a-fleet-wide-hack-of-teslas.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt3.staticworld.net/images/article/2015/09/musk_cool_car-100616845-medium.idge.jpg" />
						<media:content url="http://zapt3.staticworld.net/images/article/2015/09/musk_cool_car-100616845-medium.idge.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Hacking</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>

		<title>23% off HDMI Cloner Box for Gaming or HD Video Stream Capture, No PC needed - Deal Alert </title>

		<pubDate>Mon, 17 Jul 2017 06:40:00 -0700</pubDate>

		
		
		
		<author>DealPost Team</author>
		<dc:creator>DealPost Team</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Here's a device any gamer or video enthusiast may want to have on hand. Connect a game console, DVD, or any video source to this gadget via its HDMI input, and with the push of a button it captures and saves the video stream to any attached USB flash drive, with no PC required. Advanced hardware H.264 encoding captures your live gameplay or video playback in 1080p Full HD, while keeping the file size low and capturing speeds high. Averaging 4 out of 5 stars on Amazon from over 170 customers (<a href="https://www.amazon.com/HDML-Cloner-need-Capture-streaming-videos/product-reviews/B00TF9MCXU/ref=cm_cr_dp_see_all_btm?tag=techconnect00-20&amp;ie=UTF8&amp;showViewpoints=1&amp;sortBy=recent">read reviews</a>), the gadget's $129.99 list price has been reduced <a class="productLink" href="https://www.amazon.com/HDML-Cloner-Standalone-Capture-without-included/dp/B00TF9MCXU?SubscriptionId=AKIAIRZJHSP2SKQIWVZA&amp;tag=cso04f-20&amp;linkCode=xm2&amp;camp=2025&amp;creative=165953&amp;creativeASIN=B00TF9MCXU" rel="nofollow" data-productid="1435500" data-po="amazon" data-product-id="1435500" data-bkc="ConsumerElectronics" data-bkmfr="ClonerAlliance" data-bkvndr="Amazon">23% to $99.99</a>. With the unit you'll get a free 16gb USB stick to get you started (enough for several hours of video). <a class="productLink" href="https://www.amazon.com/HDML-Cloner-Standalone-Capture-without-included/dp/B00TF9MCXU?SubscriptionId=AKIAIRZJHSP2SKQIWVZA&amp;tag=cso04f-20&amp;linkCode=xm2&amp;camp=2025&amp;creative=165953&amp;creativeASIN=B00TF9MCXU" rel="nofollow" data-productid="1435500" data-po="amazon" data-product-id="1435500" data-bkc="ConsumerElectronics" data-bkmfr="ClonerAlliance" data-bkvndr="Amazon">See the discounted cloner box now on Amazon</a>.</p><p class="jumpTag"><a href="/article/3104008/software-games/23-off-hdmi-cloner-box-for-gaming-or-hd-video-stream-capture-no-pc-needed-deal-alert.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3104008/software-games/23-off-hdmi-cloner-box-for-gaming-or-hd-video-stream-capture-no-pc-needed-deal-alert.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt2.staticworld.net/images/article/2016/08/hdmi_cloner-100675601-primary.idge.jpg" />
						<media:content url="http://zapt2.staticworld.net/images/article/2016/08/hdmi_cloner-100675601-primary.idge.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
				
				
					
						<category>Consumer Electronics</category>
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
				
				
					
						<category>Hardware</category>
					
				
				
					
						<category>Gaming</category>
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>

		<title>47% off Mpow Fully Submersible Waterproof Phone Dry Bag, 2-Pack - Deal Alert</title>

		<pubDate>Mon, 17 Jul 2017 06:39:00 -0700</pubDate>

		
		
		
		<author>DealPost Team</author>
		<dc:creator>DealPost Team</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>For extreme conditions, this phone pouch features a simple snap and lock design that easily keeps out water, snow, dust, sand, and dirt, without hindering use of touch-screen or camera. It fits all large smartphones up to 6 inches, as well as your cash, documents, credit cards, or any similar sized items you need safe from the elements while outdoors. The 2-pack's typical list price of $16.99 has been reduced 47% right now to $8.99. <a class="productLink" href="https://www.amazon.com/Mpow-Waterproof-Universal-Outdoor-Activities/dp/B01I1430WQ?psc=1&amp;SubscriptionId=AKIAIRZJHSP2SKQIWVZA&amp;tag=cso04f-20&amp;linkCode=xm2&amp;camp=2025&amp;creative=165953&amp;creativeASIN=B01I1430WQ" rel="nofollow" data-productid="1438908" data-po="amazon" data-product-id="1438908" data-bkc="Mobile" data-bkmfr="Mpow" data-bkvndr="Amazon">See this deal on Amazon</a>.</p><p class="jumpTag"><a href="/article/3208349/mobile/47-off-mpow-fully-submersible-waterproof-phone-dry-bag-2-pack-deal-alert.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3208349/mobile/47-off-mpow-fully-submersible-waterproof-phone-dry-bag-2-pack-deal-alert.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt3.staticworld.net/images/article/2017/07/waterproof_case-100729290-large.3x2.jpg" />
						<media:content url="http://zapt3.staticworld.net/images/article/2017/07/waterproof_case-100729290-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Mobile</category>
					
				
				
					
				
				
					
						<category>Consumer Electronics</category>
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: The Evolution of the Firewall </title>

		<pubDate>Mon, 17 Jul 2017 06:00:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p><em> As the Internet and Digital Economy have grown up, the humble Firewall has continued to serve as their go-to security appliance. In this first of a two-part series, we will examine how, in spite of the evolution of the Firewall through a number of shapes, functions, and roles, it remains the security foundation for implementing the strategic pillars of Segmentation, Access Control, and Real-time analytics/action now and into the future.</em></p><p>Change is a fact of life; what doesn’t change usually withers and dies. This is true for both the biological and the digital world. Generally, we make leaps forward because of one or more of the following: </p><p class="jumpTag"><a href="/article/3208344/security/the-evolution-of-the-firewall.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3208344/security/the-evolution-of-the-firewall.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt1.staticworld.net/images/article/2017/07/istock-510859324-100729226-medium.jpg" />
						<media:content url="http://zapt1.staticworld.net/images/article/2017/07/istock-510859324-100729226-medium.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
			
				
			
		
		
	<item>

		<title>IDG Contributor Network: MQTT is not evil, just not always secure</title>

		<pubDate>Mon, 17 Jul 2017 05:32:00 -0700</pubDate>

		
		
		
		<author>Tom Olzak</author>
		<dc:creator>Tom Olzak</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>I recently wrote <a href="http://www.csoonline.com/article/3207770/internet-of-things/iot-messaging-protocol-is-big-security-risk.html">an article for CSOonline about the security of IoT</a>.  Although primarily about the use of the MQTT protocol, it applies to general security considerations of IoT connectivity.  I received one strong rebuttal by an IBM developer, claiming that I overstated the risk.  I welcome any professional feedback on my positions on any security challenge.  Since this rebuttal was in Twitter, I decided to respond here where I have more than 140 words available.</p><h3>Summary of argument</h3>
<p>First, the OASIS standard MQTT protocol is not secure by itself.  Any implementation requires TLS or other means to secure sessions.  Further, it does not require devices to authenticate to servers.  Does this make all implementations of MQTT unsafe?  No.  Are there many organizations using MQTT or other messaging protocol unsecurely?  Yes.  A Google search provides many examples, so I won’t try to list them here.</p><p class="jumpTag"><a href="/article/3208325/internet-of-things/mqtt-is-not-evil-just-not-always-secure.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3208325/internet-of-things/mqtt-is-not-evil-just-not-always-secure.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt0.staticworld.net/images/article/2015/01/big_data_risks-100564722-primary.idge.jpg" />
						<media:content url="http://zapt0.staticworld.net/images/article/2015/01/big_data_risks-100564722-primary.idge.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Internet of Things</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
			
				
			
		
		
	<item>

		<title>IDG Contributor Network: Ghosts in the machine</title>

		<pubDate>Mon, 17 Jul 2017 05:30:00 -0700</pubDate>

		
		
		
		<author>Tom Waters</author>
		<dc:creator>Tom Waters</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<h3>Hoover’s List</h3>
<p>The FBI’s ‘<em>Ten Most Wanted List’</em> was <a href="http://www.history.com/this-day-in-history/the-fbi-debuts-10-most-wanted">born in 1950</a>, after a conversation between legendary Director J. Edgar Hoover and William Kinsey Hutchinson, the editor in chief of what became United Press International.  A published article the year before detailing Hoover’s most wanted ‘bad guys’ garnered so much positive publicity the Bureau created the list in response.</p><p>Contrary to popular legend, the list is not ranked.  As fugitives are caught, die, or their charges are dropped, they move up and down the list.  (Disappointingly, there isn’t really a ‘<em>Number One on the FBI’s Most Wanted List’</em>.)  And for nearly five decades that’s how the program worked. </p><p class="jumpTag"><a href="/article/3208347/data-breach/ghosts-in-the-machine.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3208347/data-breach/ghosts-in-the-machine.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt4.staticworld.net/images/article/2017/01/10_fbi-100705496-large.3x2.jpg" />
						<media:content url="http://zapt4.staticworld.net/images/article/2017/01/10_fbi-100705496-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Data Breach</category>
					
				
				
					
						<category>Data Loss Prevention</category>
					
				
				
					
						<category>Hacking</category>
					
				
				
					
						<category>Information Security</category>
					
				
				
					
						<category>Legal</category>
					
				
				
					
						<category>Technology Industry</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>

		<title>What is gamification? Lessons for awareness programs from Pokemon Go</title>

		<pubDate>Mon, 17 Jul 2017 04:49:00 -0700</pubDate>

		
		
		
		<author>Ira Winkler</author>
		<dc:creator>Ira Winkler</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Most people do not understand <a href="http://www.csoonline.com/article/3069948/security/7-reasons-to-gamify-your-cybersecurity-strategy.html" target="_blank">gamification</a>, and inevitably vendors and people misuse the term and overuse it inappropriately. Gamification is essentially rewarding people for exhibiting a desired behavior. It is not merely creating a game for people to play, nor making training a game.</p><p>There are four required characteristics of a gamification program:</p><ol>
<li>A defined goal with defined rewards</li>
<li>Well established rules on how to achieve the goal and rewards</li>
<li>Feedback as to where people stand in achieving the goals.</li>
<li>Voluntary participation</li>
</ol>
<p>Pokemon Go demonstrates all of these traits and demonstrates what you should be looking for when vendors or your staff describe their gamification efforts.</p><p class="jumpTag"><a href="/article/3104551/security-awareness/what-awareness-gamification-programs-can-learn-from-pokemon-go.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3104551/security-awareness/what-awareness-gamification-programs-can-learn-from-pokemon-go.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt4.staticworld.net/images/article/2016/08/pokemon_go_pikachu-100675912-primary.idge.jpg" />
						<media:content url="http://zapt4.staticworld.net/images/article/2016/08/pokemon_go_pikachu-100675912-primary.idge.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Skills and Training</category>
					
				
				
					
						<category>Mobile Security</category>
					
				
				
					
						<category>Security</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
			
		
		
	<item>

		<title>Can computer science education be fun?</title>

		<pubDate>Mon, 17 Jul 2017 04:00:00 -0700</pubDate>

		
		
		
		<author>Kacy Zurkus</author>
		<dc:creator>Kacy Zurkus</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Retail sales and truck driving are two of the most common jobs in America. They are also jobs that may eventually be automated. That's why David Delmar, executive director and founder of <a href="http://www.resilientcoders.org">Resilient Coders</a>, said, "Coding is the new blue-collar job."</p><p>Accepting that reality, though, means that a lot has to change about how we educate kids. Yet, "For most states and school districts, the notion of <a href="https://code.org/framework-announcement">computer science for every student is a relatively new</a> and unexplored topic," according to Code.org. </p><p>Even though there are currently <strong>530,472 </strong>open computing jobs nationwide, <a href="https://code.org/promote">only <strong>42,969 </strong>computer science students graduated into the workforce</a> last year.</p><p class="jumpTag"><a href="/article/3207725/it-careers/can-computer-science-education-be-fun.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3207725/it-careers/can-computer-science-education-be-fun.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt3.staticworld.net/images/article/2015/12/africacodebustour-100630995-primary.idge.jpg" />
						<media:content url="http://zapt3.staticworld.net/images/article/2015/12/africacodebustour-100630995-primary.idge.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Careers</category>
					
				
				
					
						<category>IT Leadership</category>
					
				
				
					
						<category>Skills and Training</category>
					
				
				
					
						<category>Machine Learning</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>

		<title>Six entry-level cybersecurity job seeker failings</title>

		<pubDate>Mon, 17 Jul 2017 03:00:00 -0700</pubDate>

		
		
		
		<author>George V. Hulme</author>
		<dc:creator>George V. Hulme</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>When it comes to hiring, enterprise security teams can use all of the help that they can rally. When hiring entry-level talent, that’s not as easy as it may seem — many times because entry-level applicants don’t do everything they could to help their cause.</p><p>For years a dearth of young professionals interested in cybersecurity has existed, but that could be changing for the better. This is both good news and bad news for cybersecurity job seekers. While the competition for these positions will be heating up (bad news), the good news (for job applicants, anyway) is that number of openings remains vast. According to the <a href="http://www.prnewswire.com/news-releases/global-cybersecurity-workforce-shortage-to-reach-18-million-as-threats-loom-larger-and-stakes-rise-higher-300469866.html" target="_blank"><em>Global Information Security Workforce</em> <em>Study</em></a>, the cybersecurity talent skills shortage remains stark. By 2022, there will be a 1.8 million worker shortage – a 20 percent increase since 2015, this Frost &amp; Sullivan for the Center for Cyber Safety and Education survey predicts.</p><p class="jumpTag"><a href="/article/3207668/it-careers/six-entry-level-cybersecurity-job-seeker-failings.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3207668/it-careers/six-entry-level-cybersecurity-job-seeker-failings.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt3.staticworld.net/images/article/2017/01/building-804526_1280-100702752-large.3x2.jpg" />
						<media:content url="http://zapt3.staticworld.net/images/article/2017/01/building-804526_1280-100702752-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Careers</category>
					
				
				
					
						<category>Security</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
			
		
		
	<item>

		<title>White House released voter-fraud commenters&#039; sensitive personal information</title>

		<pubDate>Sun, 16 Jul 2017 09:51:00 -0700</pubDate>

		
		
		
		<author>Ms. Smith</author>
		<dc:creator>Ms. Smith</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>The White House more or less doxed citizens, who took the time to submit feedback to the Presidential Advisory Commission on Election Integrity, by publishing 112 pages (<a href="https://www.whitehouse.gov/sites/whitehouse.gov/files/docs/comments-received-june-29-through-july-11-2017.pdf">pdf</a>) of public comments without first redacting any personal information; some of the emailed comments were outraged, some commenters dropped f-bombs, one sent goatse, but they were published in full, including those that <a href="https://twitter.com/ChrisLu44/status/885894329079808001" target="_blank">showed</a> citizens’ “email addresses, home addresses and phone numbers.”</p><p class="jumpTag"><a href="/article/3208385/privacy/white-house-released-voter-fraud-commenters-sensitive-personal-information.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3208385/privacy/white-house-released-voter-fraud-commenters-sensitive-personal-information.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt2.staticworld.net/images/article/2016/10/election_2016_teaser_22_no_confidence_broken_election_divided_vote-100685739-primary.idge.jpg" />
						<media:content url="http://zapt2.staticworld.net/images/article/2016/10/election_2016_teaser_22_no_confidence_broken_election_divided_vote-100685739-primary.idge.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Privacy</category>
					
				
				
					
						<category>Security</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
			
				
			
		
		
	<item>

		<title>IDG Contributor Network: Cybersecurity for Family Offices: Q&amp;A with the director of the Global Family Office Group at Citi Private Bank</title>

		<pubDate>Sun, 16 Jul 2017 07:43:00 -0700</pubDate>

		
		
		
		<author>Jeremy King</author>
		<dc:creator>Jeremy King</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Last month Citi Private Bank released a white paper focused on the growing cybersecurity threat and its relevance to Family Offices. The white paper surveyed information security experts in and outside of Citi to provide a comprehensive guide on a topic of high interest to Family Offices. The full white paper can be accessed on the Citi Private Bank website <a href="http://cts.businesswire.com/ct/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.privatebank.citibank.com%2Fivc%2Fdocs%2FFamilyOffices_Cybersecurity.pdf&amp;esheet=51567400&amp;newsitemid=20170531005916&amp;lan=en-US&amp;anchor=here&amp;index=1&amp;md5=b5ad214f02db303343f03b8950f3e0b4" rel="nofollow" target="_blank">here</a>. </p><p class="jumpTag"><a href="/article/3205872/cyber-attacks-espionage/cybersecurity-for-family-offices-qa-with-the-director-of-the-global-family-office-group-at-citi-pri.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3205872/cyber-attacks-espionage/cybersecurity-for-family-offices-qa-with-the-director-of-the-global-family-office-group-at-citi-pri.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt1.staticworld.net/images/article/2014/12/cybersecurity_stock_image-100534238-primary.idge.jpg" />
						<media:content url="http://zapt1.staticworld.net/images/article/2014/12/cybersecurity_stock_image-100534238-primary.idge.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Cyber Crime</category>
					
				
				
					
						<category>Information Security</category>
					
				
				
					
						<category>Technology Industry</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>

		<title>The 5 worst big data privacy risks (and how to guard against them)</title>

		<pubDate>Fri, 14 Jul 2017 08:21:00 -0700</pubDate>

		
		
		
		<author>Taylor Armerding</author>
		<dc:creator>Taylor Armerding</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Big data, as its proponents have been saying for nearly a decade now, can bring big benefits: advertisements focused on what you actually want to buy, smart cars that can help you avoid collisions or call for an ambulance if you happen to get in one anyway, wearable or implantable devices that can monitor your health and notify your doctor if something is going wrong. </p><p>It can also lead to big privacy problems. By now it is glaringly obvious that when people generate thousands of data points every day — where they go, who they communicate with, what they read and write, what they buy, what they eat, what they watch, how much they exercise, how much they sleep and more — they are vulnerable to exposure in ways unimaginable a generation ago. </p><p class="jumpTag"><a href="/article/2855641/privacy/the-5-worst-big-data-privacy-risks-and-how-to-guard-against-them.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/2855641/privacy/the-5-worst-big-data-privacy-risks-and-how-to-guard-against-them.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt1.staticworld.net/images/article/2014/12/balloons_in_sky-100534085-primary.idge.jpg" />
						<media:content url="http://zapt1.staticworld.net/images/article/2014/12/balloons_in_sky-100534085-primary.idge.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Privacy</category>
					
				
				
					
						<category>Big Data</category>
					
				
				
					
						<category>Security</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>

		<title>37% off Fitfort 4K WiFi Ultra HD Waterproof Sport Camera - Deal Alert</title>

		<pubDate>Fri, 14 Jul 2017 06:54:00 -0700</pubDate>

		
		
		
		<author>DealPost Team</author>
		<dc:creator>DealPost Team</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>This sport camera is a budget-friendly alternative to GoPro. It averages 4.5 out of 5 stars from over 230 reviewers on Amazon, where Its list price of $100 is currently discounted 37% to just $64. Designed to be used for biking, hiking, diving, swimming, surfing, or anywhere else you could use a rugged, waterproof camera. The camera provides 4K/25FPS, 2.7K/30FPS, 1080P/60FPS, 1080P/30FPS and 720P/120FPS video resolution. Comes with a wireless remote, and 2 rechargeable batteries that provide up to 90 minutes of continuous filming each. <a class="productLink" href="https://www.amazon.com/FITFORT-Waterproof-Rechargeable-Batteries-Accessories/dp/B06XFM62GB?psc=1&amp;SubscriptionId=AKIAIRZJHSP2SKQIWVZA&amp;tag=cso04f-20&amp;linkCode=xm2&amp;camp=2025&amp;creative=165953&amp;creativeASIN=B06XFM62GB" rel="nofollow" data-productid="1438898" data-po="amazon" data-product-id="1438898" data-bkc="Mobile" data-bkmfr="FITFORT" data-bkvndr="Amazon">See this deal on Amazon</a>.</p><p class="jumpTag"><a href="/article/3208112/mobile/37-off-fitfort-4k-wifi-ultra-hd-waterproof-sport-camera-deal-alert.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3208112/mobile/37-off-fitfort-4k-wifi-ultra-hd-waterproof-sport-camera-deal-alert.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt0.staticworld.net/images/article/2017/07/sport_camera-100729153-large.3x2.jpg" />
						<media:content url="http://zapt0.staticworld.net/images/article/2017/07/sport_camera-100729153-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Mobile</category>
					
				
				
					
				
				
					
						<category>Consumer Electronics</category>
					
				
				
					
				
				
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>

		<title>Who is a target for ransomware attacks?</title>

		<pubDate>Fri, 14 Jul 2017 06:51:00 -0700</pubDate>

		
		
		
		<author>James A. Martin</author>
		<dc:creator>James A. Martin</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>The short answer to the question posed in the headline is 'everyone': Every small business, midsized company, enterprise, and organization is fair game, especially in light of the recent <a href="http://www.csoonline.com/article/3196400/data-breach/wannacry-fallout-the-worst-is-yet-to-come-experts-say.html" target="_blank">WannaCry</a> and <a href="http://www.csoonline.com/article/3204508/security/petya-is-it-ransomware-or-cyberwarfare.html" target="_blank">Petya attacks</a> (though the latter was an atypical ransomware example).</p><p>The long answer is more complicated. Your vulnerability to a ransomware attack can depend upon how attractive your data is to criminal hackers, how critical it is that you respond quickly to a ransom demand, how vulnerable your security is, and how vigorously you keep employees trained about phishing emails, among other factors.</p><p class="jumpTag"><a href="/article/3208111/security/who-is-a-target-for-ransomware-attacks.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3208111/security/who-is-a-target-for-ransomware-attacks.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt3.staticworld.net/images/article/2017/02/ransomware-100710984-large.3x2.jpg" />
						<media:content url="http://zapt3.staticworld.net/images/article/2017/02/ransomware-100710984-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Cyber Crime</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
			
				
			
		
		
	<item>

		<title>IDG Contributor Network: How cognitive and robotic automation play in SecOps</title>

		<pubDate>Fri, 14 Jul 2017 06:27:00 -0700</pubDate>

		
		
		
		<author>Kumar Saurabh</author>
		<dc:creator>Kumar Saurabh</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>The prevalence of automation is everywhere in our modern, tech-first culture and continuously on the rise — with good reason. Cybersecurity experts see vast amounts of data and countless attempted breaches, becoming literally overwhelmed and specifically because of two challenges: (1) effectively finding attacks hidden among billions of daily security events, (2) efficiently responding to those attacks in a timely manner.</p><p>These challenges are not being addressed and, in most SOCs, decades-old tools are used to do only a partial job. These tools are simple, rules-based systems and fundamentally limited in capabilities. For those testing new techniques, automation is consistently used at the wrong times and in the wrong ways. This leads to a rise in breaches and millions of unfilled security analyst positions.</p><p class="jumpTag"><a href="/article/3207534/data-protection/how-cognitive-and-robotic-automation-play-in-secops.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3207534/data-protection/how-cognitive-and-robotic-automation-play-in-secops.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt4.staticworld.net/images/article/2017/05/artificial_intelligence_machine_learning_thinkstock_639426256-100724413-large.3x2.jpg" />
						<media:content url="http://zapt4.staticworld.net/images/article/2017/05/artificial_intelligence_machine_learning_thinkstock_639426256-100724413-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Information Security</category>
					
				
				
					
				
				
					
						<category>Advanced Persistent Threats</category>
					
				
				
					
						<category>Technology Industry</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
			
				
			
		
		
	<item>

		<title>IDG Contributor Network: IoT messaging protocol is big security risk</title>

		<pubDate>Fri, 14 Jul 2017 06:23:00 -0700</pubDate>

		
		
		
		<author>Tom Olzak</author>
		<dc:creator>Tom Olzak</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>The insecure implementation of the <a href="https://en.wikipedia.org/wiki/MQTT">MQTT</a> (Message Queue Telemetry Transport) protocol, an <a href="https://www.oasis-open.org/news/announcements/mqtt-version-3-1-1-becomes-an-oasis-standard">Oasis standard for IoT communication</a>, by many IoT product vendors is contributing to the high risk of IoT devices on enterprise and home networks.  Although TLS is <a href="https://downloads.cloudsecurityalliance.org/whitepapers/Security_Guidance_for_Early_Adopters_of_the_Internet_of_Things.pdf">recommended by the Cloud Security Alliance</a> for secure communication with MQTT, most vendors appear to ignore transport security, making all communication open and available.  Further, authentication is often ignored.</p><p class="jumpTag"><a href="/article/3207770/internet-of-things/iot-messaging-protocol-is-big-security-risk.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3207770/internet-of-things/iot-messaging-protocol-is-big-security-risk.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt1.staticworld.net/images/article/2017/05/wifi-iot-100722302-large.3x2.jpg" />
						<media:content url="http://zapt1.staticworld.net/images/article/2017/05/wifi-iot-100722302-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Internet of Things</category>
					
				
				
					
						<category>Information Security</category>
					
				
				
					
						<category>Cloud Security</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
			
				
			
		
		
	<item>

		<title>IDG Contributor Network: Just because it&#039;s news doesn&#039;t mean it&#039;s new</title>

		<pubDate>Fri, 14 Jul 2017 06:19:00 -0700</pubDate>

		
		
		
		<author>Ed Snodgrass</author>
		<dc:creator>Ed Snodgrass</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Chances are you’ve seen a similar image over the past several months.  Either on internal systems (hopefully not) or within the countless blogs, news stories and industry journals that bombard us every day with ominous warnings and dire consequences.  It is, of course, ransomware. And while it (and media coverage of it) has dominated the cybersecurity world for the last several years, it’s not new.  Also, not new are the fundamental security building-blocks necessary to mitigate its impact or the fact that it represents a cyber risk.</p><p>What does seem new is the incredible amount of singular focus on these incidents around the ‘cyber watercooler’ that drowned out the broader discussion of the underlying principles comprising a solid cyber security program.  In addition, the tenor of the cyber risk discussion has seemingly changed as well, from an enterprise-level conversation to a single-point conversation.  Neither of these trends are positive.</p><p class="jumpTag"><a href="/article/3208024/ransomware/just-because-its-news-doesnt-mean-its-new.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3208024/ransomware/just-because-its-news-doesnt-mean-its-new.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt2.staticworld.net/images/article/2017/05/img_20170512_095943-100722543-large.3x2.jpg" />
						<media:content url="http://zapt2.staticworld.net/images/article/2017/05/img_20170512_095943-100722543-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Ransomware</category>
					
				
				
					
						<category>Malware</category>
					
				
				
					
						<category>Cyber Crime</category>
					
				
				
					
						<category>Technology Industry</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
			
				
			
		
		
	<item>

		<title>IDG Contributor Network: Why automation isn’t everything in cybersecurity</title>

		<pubDate>Fri, 14 Jul 2017 06:16:00 -0700</pubDate>

		
		
		
		<author>Kumar Saurabh</author>
		<dc:creator>Kumar Saurabh</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>With the latest advancements in automation and AI, many CISOs are recognizing the potential for automation to transform security operations. Given the way many technology vendors hype their solutions, you could be forgiven for thinking humans should be removed from security flows to the greatest extent possible. But, you would be wrong!</p><p>On the contrary, security analysts are not only an important part of the security process, they are THE most important part. So, when you think of automation, you should think of it not as a way of replacing security analysts, but rather as a way of empowering them to do more of what they do best. This is an important distinction.</p><p class="jumpTag"><a href="/article/3208071/data-protection/why-automation-isnt-everything-in-cybersecurity.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3208071/data-protection/why-automation-isnt-everything-in-cybersecurity.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt3.staticworld.net/images/article/2016/11/4_machine_human-100693355-large.3x2.jpg" />
						<media:content url="http://zapt3.staticworld.net/images/article/2016/11/4_machine_human-100693355-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Information Security</category>
					
				
				
					
						<category>Technology Industry</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: Authentication and Business Context: Answering the “Who? What? And Where?</title>

		<pubDate>Thu, 13 Jul 2017 08:22:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Traditional authentication solutions require a trade-off between security and usability, often deployed with a “one-size-fits-most” strategy. But today there’s a whole lot more at stake, so enterprises need more to effectively protect critical applications when delivering access in a world without boundaries. That “more” comes by way of risk mitigation.</p><p>By applying a risk-based approach to your authentication strategy with identity assurance, you can go beyond simple authentication approaches. You can deliver both security and convenience without sacrifice. Risk-based identity assurance is transforming multi-factor authentication from a simple yes/no decision or step-up process by adding intelligence to the decision of which access is granted in which situations.</p><p class="jumpTag"><a href="/article/3207627/security/authentication-and-business-context-answering-the-who-what-and-where.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3207627/security/authentication-and-business-context-answering-the-who-what-and-where.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt1.staticworld.net/images/article/2017/07/rsa_bp_article-3_istock-477992493-copy-100728967-large.3x2.jpg" />
						<media:content url="http://zapt1.staticworld.net/images/article/2017/07/rsa_bp_article-3_istock-477992493-copy-100728967-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Identity Management</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: Cyberespionage: Your intellectual property under threat</title>

		<pubDate>Thu, 13 Jul 2017 07:38:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<div class="OutlineElement Ltr SCX210127672">
<p class="Paragraph SCX210127672"><span class="TextRun SCX210127672" lang="EN-US" xml:lang="EN-US"><span class="NormalTextRun SCX210127672">Cyberespionage conjures up nightmare scenarios for private and public organizations. For governments, it might involve the prospect of foreign agents filching details on a new missile system</span></span><span class="TextRun SCX210127672" lang="EN-US" xml:lang="EN-US"><span class="NormalTextRun SCX210127672">. F</span></span><span class="TextRun SCX210127672" lang="EN-US" xml:lang="EN-US"><span class="NormalTextRun SCX210127672">or an auto company, it could be hackers stealing their blueprints for a next-generation auto.</span></span> </p><p class="jumpTag"><a href="/article/3200608/data-breach/cyberespionage-your-intellectual-property-under-threat.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3200608/data-breach/cyberespionage-your-intellectual-property-under-threat.html#tk.rss_all</link>
		
		
		
		
		
		
		

		
		
			<categories>
				
				
					
						<category>Data Breach</category>
					
				
				
					
						<category>Network Security</category>
					
				
				
					
						<category>Internet</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>

		<title>48% off Inateck 2.5 Inch USB 3.0 Hard Drive Enclosure External Case - Deal Alert</title>

		<pubDate>Thu, 13 Jul 2017 06:27:00 -0700</pubDate>

		
		
		
		<author>DealPost Team</author>
		<dc:creator>DealPost Team</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p><span class="a-list-item"><a class="productLink" href="https://www.amazon.com/Inateck-Enclosure-Supported-Tool-Free-FE2007/dp/B00T2ODFCU?SubscriptionId=AKIAIRZJHSP2SKQIWVZA&amp;tag=cso04f-20&amp;linkCode=xm2&amp;camp=2025&amp;creative=165953&amp;creativeASIN=B00T2ODFCU" rel="nofollow" data-productid="1435548" data-po="amazon" data-product-id="1435548" data-bkc="BackupandRecovery" data-bkmfr="Inateck" data-bkvndr="Amazon">This 3 port USB 3.0 hub</a> converts any 9.5mm &amp; 7mm 2.5-Inch SATA HDD/SSD into an external hard drive for ultimate mobility and convenience. Setup is t</span><span class="a-list-item">ool free and easy to install and disassemble.  A built-in foam pad protects the hard disk. This device features automatic sleep and spin-down, and goes into sleep mode automatically after 10 minutes in idle state. </span><span class="a-list-item">Currently receiving 4.5 out of 5 stars on Amazon (<a href="https://www.amazon.com/Inateck-External-Enclosure-Supported-Tool-Free/product-reviews/B00T2ODFCU/ref=as_li_ss_tl?ie=UTF8&amp;showViewpoints=1&amp;sortBy=helpful&amp;linkCode=ll2&amp;tag=techconnect00-20&amp;linkId=5bcdac115ffa7928461102ee5b024ee2">read reviews</a>), it's discounted by 48% down to just $21.99,  <a class="productLink" href="https://www.amazon.com/Inateck-Enclosure-Supported-Tool-Free-FE2007/dp/B00T2ODFCU?SubscriptionId=AKIAIRZJHSP2SKQIWVZA&amp;tag=cso04f-20&amp;linkCode=xm2&amp;camp=2025&amp;creative=165953&amp;creativeASIN=B00T2ODFCU" rel="nofollow" data-productid="1435548" data-po="amazon" data-product-id="1435548" data-bkc="BackupandRecovery" data-bkmfr="Inateck" data-bkvndr="Amazon">See it on Amazon</a>.</span></p><p class="jumpTag"><a href="/article/3105575/computers-accessories/50-off-inateck-3-port-usb-3-0-hub-with-2-5-inch-usb-3-0-hard-drive-disk-external-enclosure-case-for.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3105575/computers-accessories/50-off-inateck-3-port-usb-3-0-hub-with-2-5-inch-usb-3-0-hard-drive-disk-external-enclosure-case-for.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt3.staticworld.net/images/article/2016/08/inateck-3-ports-usb-3.0-hub-100676132-primary.idge.jpg" />
						<media:content url="http://zapt3.staticworld.net/images/article/2016/08/inateck-3-ports-usb-3.0-hub-100676132-primary.idge.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
				
				
					
						<category>Backup and Recovery</category>
					
				
				
					
				
				
					
						<category>Consumer Electronics</category>
					
				
				
					
				
				
					
						<category>Hardware</category>
					
				
				
					
				
				
					
						<category>Mobile</category>
					
				
				
					
				
				
					
						<category>Storage</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>

		<title>66% off Anker SoundCore Bluetooth Speaker with 24-Hour Playtime &amp; Built-in Mic - Deal Alert</title>

		<pubDate>Thu, 13 Jul 2017 06:18:00 -0700</pubDate>

		
		
		
		<author>DealPost Team</author>
		<dc:creator>DealPost Team</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Anker's highly rated SoundCore Bluetooth speaker's typical list price of $79.99 has been discounted 66% today to just $26.99 on Amazon, where it averages 4.6 out of 5 stars from over 7,500 reviewers (76% rate the full 5 stars: <a href="https://www.amazon.com/Anker-SoundCore-Bluetooth-Dual-Driver-Distortion/product-reviews/B016XTADG2/ref=cm_cr_dp_d_show_all_btm?ie=UTF8&amp;reviewerType=all_reviews&amp;sortBy=recent">read reviews here</a>). It features rich sound, a generous 24 hours of play time (500 continuous songs without needing a charge), Bluetooth 4.0 66-foot wireless range and a worry-free 18 month warranty. This deal is good for today only (7/13), so <a href="https://www.amazon.com/Anker-SoundCore-Bluetooth-Dual-Driver-Distortion/dp/B016XTADG2/ref=cm_cr_arp_d_product_top?ie=UTF8">see it now on Amazon</a>.</p><p class="jumpTag"><a href="/article/3207755/mobile/66-off-anker-soundcore-bluetooth-speaker-with-24-hour-playtime-and-built-in-mic-deal-alert.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3207755/mobile/66-off-anker-soundcore-bluetooth-speaker-with-24-hour-playtime-and-built-in-mic-deal-alert.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt3.staticworld.net/images/article/2017/07/anker_soundcore-100728992-large.3x2.jpg" />
						<media:content url="http://zapt3.staticworld.net/images/article/2017/07/anker_soundcore-100728992-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Mobile</category>
					
				
				
					
						<category>Consumer Electronics</category>
					
				
				
					
				
				
					
				
				
					
				
				
					
						<category>Home Tech</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>

		<title>Look beyond job boards to fill cybersecurity jobs</title>

		<pubDate>Thu, 13 Jul 2017 03:02:00 -0700</pubDate>

		
		
		
		<author>Maria Korolov</author>
		<dc:creator>Maria Korolov</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>The cybersecurity talent shortage keeps getting worse. According to <a href="http://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/" target="_blank">Cybersecurity Ventures</a>, the cost of cybercrime will double from $3 trillion globally in 2015 to $6 trillion by 2021. Meanwhile, the number of open cybersecurity jobs will increase from 1 million in 2016 to 1.5 million by 2019.</p><p>Meanwhile, the scale and damage of the attacks continues to increase. According to <a href="https://www.juniperresearch.com/researchstore/strategy-competition/cybercrime-security/enterprise-threats-mitigation" target="_blank">Juniper Research</a>, 2.8 billion customer data records are expected to be stolen this year, increasing to 5 billion by 2022. The total cost of ransomware attacks alone is estimated to reach $5 billion this year, according to <a href="http://cybersecurityventures.com/ransomware-damage-report-2017-5-billion/" target="_blank">Cybersecurity Ventures</a>, up from $325 million in 2015.</p><p class="jumpTag"><a href="/article/3206688/it-careers/firms-look-beyond-job-boards-to-find-and-recruit-cybersecurity-talent.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3206688/it-careers/firms-look-beyond-job-boards-to-find-and-recruit-cybersecurity-talent.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt3.staticworld.net/images/article/2016/10/cybersecurity_skills_and_talent_shortage-100689361-large.3x2.jpg" />
						<media:content url="http://zapt3.staticworld.net/images/article/2016/10/cybersecurity_skills_and_talent_shortage-100689361-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Careers</category>
					
				
				
					
						<category>Security</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>

		<title>SandBlast Mobile simplifies mobile security</title>

		<pubDate>Thu, 13 Jul 2017 02:54:00 -0700</pubDate>

		
		
		
		<author>David Strom</author>
		<dc:creator>David Strom</dc:creator>
		

		
		
		<description><![CDATA[<p>Many of us would rather give up one of our limbs than stop using our mobile phones or tablets. But as we become more addicted to mobiles, it means more opportunities to be infected by malware and other exploits. And if our phones are infected, chances are attackers can use them as a gateway to our corporate networks. <p class="jumpTag"><a href="/article/3206186/mobile-security/review-sandblast-mobile-simplifies-mobile-security.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]>(Insider Story)</description>

		<link>http://www.csoonline.com/article/3206186/mobile-security/review-sandblast-mobile-simplifies-mobile-security.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt2.staticworld.net/images/idgnsImport/2015/08/id-2972116-security5-100608240-large.3x2.jpg" />
						<media:content url="http://zapt2.staticworld.net/images/idgnsImport/2015/08/id-2972116-security5-100608240-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Mobile Security</category>
					
				
				
					
						<category>Endpoint Protection</category>
					
				
				
					
						<category>Security</category>
					
				
				<category>IDG Insider</category>
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>

		<title>Why linguistics can&#039;t always identify cyber attackers&#039; nationality</title>

		<pubDate>Wed, 12 Jul 2017 17:53:00 -0700</pubDate>

		
		
		
		<author>Fahmida Y. Rashid</author>
		<dc:creator>Fahmida Y. Rashid</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Malware. Data theft. Ransomware. Everyone wants to know who was behind the latest audacious attack. Several attempts have been made over the years to use linguistics to identify perpetrators, but when it comes to attribution, there are limitations to using this method.</p><p>Linguistic analysis came up recently when analysts at intelligence firm Flashpoint said there was a Chinese link with the WannaCry ransomware. Much of the security research up till then had pointed to North Korean ties, as the attacks reused infrastructure components associated with the shadowy Lazarus Group. Before that, a Taia Global report suggested the The Shadow Brokers’ manifesto was actually written by a native English speaker, despite the broken English. Linguistic analysis also was used to suggest that Guccifer 2.0, who released documents stolen from the Democratic National Committee, was likely not Romanian as claimed. Back in 2014, Taia Global said linguistic clues pointed the Sony breach to Russian actors, and not the North Koreans as the United States government had claimed.</p><p class="jumpTag"><a href="/article/3200545/security/why-linguistics-cant-always-identify-cyber-attackers-nationality.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3200545/security/why-linguistics-cant-always-identify-cyber-attackers-nationality.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt3.staticworld.net/images/article/2016/10/cybersecurity_skills_and_talent_shortage-100689361-large.3x2.jpg" />
						<media:content url="http://zapt3.staticworld.net/images/article/2016/10/cybersecurity_skills_and_talent_shortage-100689361-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Cyber Crime</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
	<item>

		<title>The 15 biggest data breaches of the 21st century</title>

		<pubDate>Wed, 12 Jul 2017 14:45:00 -0700</pubDate>

		
		
		
		<author>Taylor Armerding</author>
		<dc:creator>Taylor Armerding</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Data breaches happen daily, in too many places at once to keep count, take today's news of another Verizon breach that exposed the <a href="http://money.cnn.com/2017/07/12/technology/verizon-data-leaked-online/index.html">personal data of 6 million customers</a> and a somewhat less dire <a href="https://www.reuters.com/article/us-trumphotels-cyber-idUSKBN19X2G2">breach at 14 Trump hotels</a>. But what constitutes a huge breach versus a small one? CSO compiled a list of 15 of the biggest or most significant breaches of the 21<sup>st</sup> century.</p><p>This list is based not necessarily on the number of records compromised, but on how much risk or damage the breach caused for companies, insurers and users or account holders. In some cases, passwords and other information were well protected by encryption, so a password reset eliminated the bulk of the risk.</p><p class="jumpTag"><a href="/article/2130877/data-protection/data-protection-the-15-worst-data-security-breaches-of-the-21st-century.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/2130877/data-protection/data-protection-the-15-worst-data-security-breaches-of-the-21st-century.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt2.staticworld.net/images/article/2016/11/23922465470_fe3c8b8cdf_o-100696378-large.3x2.jpg" />
						<media:content url="http://zapt2.staticworld.net/images/article/2016/11/23922465470_fe3c8b8cdf_o-100696378-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Information Security</category>
					
				
				
					
						<category>Cyber Crime</category>
					
				
				
					
						<category>Network Security</category>
					
				
				
					
						<category>Application Security</category>
					
				
				
					
						<category>Privacy</category>
					
				
				
					
						<category>Data Breach</category>
					
				
				
					
						<category>Malware</category>
					
				
				
					
						<category>Phishing</category>
					
				
				
					
						<category>Security</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: IP Geolocation Helps Companies Comply with Digital Content Licensing Agreements</title>

		<pubDate>Wed, 12 Jul 2017 13:19:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Creating and distributing digital content has never been easier. But ensuring the secure delivery of that digital content? Now that’s another story.</p><p>One important chapter of that story is the need to manage digital content so that it goes not only to the people authorized to access it, but also only to approved geographic or specific market locations. Content licensees may be prohibited from distributing the content to certain regions, countries, or even localities, and can lose their licensing rights or face regulatory or legal consequences if they fail to meet those obligations.</p><p>The need to control geographic distribution of content is rising with the staggering growth of digital content itself. Consider:</p><p class="jumpTag"><a href="/article/3207694/leadership-management/ip-geolocation-helps-companies-comply-with-digital-content-licensing-agreements.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3207694/leadership-management/ip-geolocation-helps-companies-comply-with-digital-content-licensing-agreements.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt4.staticworld.net/images/article/2017/07/istock-610127984-100728942-large.3x2.jpg" />
						<media:content url="http://zapt4.staticworld.net/images/article/2017/07/istock-610127984-100728942-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>IT Leadership</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
			
				
			
		
		
	<item>

		<title>IDG Contributor Network: Global cyber reconnaissance against the energy sector</title>

		<pubDate>Wed, 12 Jul 2017 12:40:00 -0700</pubDate>

		
		
		
		<author>John Bryk</author>
		<dc:creator>John Bryk</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<h3>Media panic <em>du jour</em></h3>
<p>National media has caused quite a self-generated sensation by <a href="https://www.nytimes.com/2017/07/06/technology/nuclear-plant-hack-report.html">splashing headlines</a> that the U.S. Nuclear Power subsector has been hacked.  Without context or understanding the media has created another “the sky is falling” cyber event.  There’s a great difference between <a href="http://www.csoonline.com/article/3062994/critical-infrastructure/is-this-the-nuclear-power-hack-weve-all-feared-hardly.html">nuclear operational networks being compromised</a> and somebody clicking a phishing email and infecting the front office, so let’s immediately set the record straight.  It was the front office.</p><p class="jumpTag"><a href="/article/3207671/energy/global-cyber-reconnaissance-against-the-energy-sector.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3207671/energy/global-cyber-reconnaissance-against-the-energy-sector.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt2.staticworld.net/images/article/2016/11/nuclear-power-plant-100693688-large.3x2.jpg" />
						<media:content url="http://zapt2.staticworld.net/images/article/2016/11/nuclear-power-plant-100693688-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
				
				
					
				
				
					
						<category>Physical Security</category>
					
				
				
					
						<category>Technology Industry</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	
	



	
	
	
		
			
			
		
		
	<item>

		<title>Exploit attacker playbooks to improve security</title>

		<pubDate>Wed, 12 Jul 2017 12:17:00 -0700</pubDate>

		
		
		
		<author>Michael Santarcangelo</author>
		<dc:creator>Michael Santarcangelo</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>High-performance teams rely on defined processes. Sometimes these are called playbooks.</p><p>Turns out disciplined attackers use playbooks, too.</p><p>Rick Howard (<a href="https://www.linkedin.com/in/rickhoward/">LinkedIn</a>, <a href="https://twitter.com/raceBannon99">Twitter</a>) suggests that knowledge might be the key to a different way to improve and automate security. A 23-year military veteran, Howard is the chief security officer for <a href="https://www.paloaltonetworks.com">Palo Alto Networks</a> where he continues to build out the Unit 42 Threat Intelligence Team, supports the company’s product lines and is a respected thought leader and company evangelist in the cybersecurity community space. He has a vast background in several different areas of InfoSec, ranging from experiences within both the public and private sectors.</p><p class="jumpTag"><a href="/article/3207692/leadership-management/exploit-attacker-playbooks-to-improve-security.html#jump">To read this article in full or to leave a comment, please click here</a></p></section></article>]]></description>

		<link>http://www.csoonline.com/article/3207692/leadership-management/exploit-attacker-playbooks-to-improve-security.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="http://zapt1.staticworld.net/images/article/2016/09/nfl-football-new-york-jets-buffalo-bills-100683321-primary.idge.jpg" />
						<media:content url="http://zapt1.staticworld.net/images/article/2016/09/nfl-football-new-york-jets-buffalo-bills-100683321-primary.idge.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>IT Leadership</category>
					
				
				
					
						<category>Advanced Persistent Threats</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
	
	




	</channel>
</rss>