Using better data to fight credit card fraud

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Jan 30, 2018
Featured Image
INSIDER

10 old-school security priniciples that (still) rule

Oldies but goodies, these security tips have stood the test of time. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Using better data to fight credit card fraud
Cloud security configuration errors put data at risk; new tools can help
How devsecops protects appsec from the cybersecurity skills gap
Rating software security Consumer Reports-style
Hacking bitcoin and blockchain

White Paper: Citrix Systems Inc

Achieve GDPR Readiness with Secure App and Data Delivery

Is the European GDPR going to change your data security strategy? Learn more about the requirements of GDPR and how they can be addressed with integrated Citrix technologies for contextual access, network security, application security, data security, and analytics and insights. Read More

Thumbnail Image

Using better data to fight credit card fraud

Galileo Processing uses artificial intelligence to more accurately identify fraudulent credit card transactions. It's an example of how AI can be a powerful security technology. Read More

Thumbnail Image
INSIDER

Cloud security configuration errors put data at risk; new tools can help

As more and more companies move to the cloud, misconfigured services are putting data and systems at risk. New management tools can help. Read More

Thumbnail Image

How devsecops protects appsec from the cybersecurity skills gap

DevSecOps may not be a 100% solution for cybersecurity skills shortage, but it can make it less of a concern in the AppSec realm. Read More

Thumbnail Image
INSIDER

Rating software security Consumer Reports-style

The Cyber Independent Testing Lab (CITL) is fuzzing binaries at scale and building a checklist of compile-time security best practices. Read More

Thumbnail Image

Hacking bitcoin and blockchain

Both bitcoin and blockchain are vulnerable to attack. Here's what you need to know to protect yourself and why blockchain is becoming a foundational technology. Read More

White Paper: Citrix Systems Inc

Addressing today's endpoint security challenges

Citrix helps customers manage data protection as business mobility, BYOD and the multi-party workforce transform endpoint security requirements. Centralized control and contextual awareness make it simpler to safeguard information and manage risk on any device people use, over any network, wherever they work. Read More

CSO Insider

1. Top security certifications: Who they're for, what they cost, and which you need
2. How to jumpstart your infosec career
3. For strong API security, you need a program not a piecemeal approach
4. Security platform or best of breed? There’s only one answer
5. Keeping pace with security automation

Editor's Picks

1. What is SSL/TLS? (And why it’s time to upgrade to TLS 1.3)
2. Meltdown and Spectre patches: Where to start and what to expect
3. The dirty dozen: 12 top cloud security threats for 2018
4. Best Android antivirus? The top 10 tools
5. The 6 best password managers
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.