Winter Olympics hit with cyber attack during opening ceremony

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Feb 13, 2018
Featured Image

4 reasons forensics will remain a pillar of cybersecurity

When protection fails, forensics can still prevail. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Winter Olympics hit with cyber attack during opening ceremony
Get 3 Years of NordVPN Service for Just $2.75 Per Month
Salted Hash Ep 18: Mobile security and privacy
Equifax hackers may have stolen more data than originally revealed
6 use cases for blockchain in security
New cryptocurrencies offer better anonymity, new security challenges

White Paper: Qubole Inc

5 Tips on Building a Big Data Culture

From hiring practices to self-service technology and employee empowerment, our 5 Tips on Building a Data-Driven Culture will set you on a path to become a truly data-driven organization -- one that uses data to start, continue, or conclude every single business decision, no matter how major or minor. Read More

Thumbnail Image

Winter Olympics hit with cyber attack during opening ceremony

Officials confirm that a cyber attack caused issues during the 2018 Winter Olympics opening ceremony in PyeongChang. Read More

Thumbnail Image
DealPost

Get 3 Years of NordVPN Service for Just $2.75 Per Month

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.75 per month for 3 years, if you sign up right now. Read More

Thumbnail Image

Salted Hash Ep 18: Mobile security and privacy

Everyone, from activists, journalists, CEOs, and politicians, walk around with a computer in their pocket, sometimes calling it a phone. This week on Salted Hash, we talk about mobile privacy and security with the founder of The Guardian Project, Nathan Freitas. Read More

Thumbnail Image

Equifax hackers may have stolen more data than originally revealed

A document submitted by Equifax to the Senate Banking Committee shows attackers may have also stolen tax ID numbers, additional driver’s license and credit card details, email addresses and phone numbers. Read More

Thumbnail Image
INSIDER

6 use cases for blockchain in security

Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection. Read More

Thumbnail Image
INSIDER

New cryptocurrencies offer better anonymity, new security challenges

Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable. Read More

White Paper: Veeam Software

All You Need to Know About Microsoft Windows Server 2016 Virtualization

This eBook will discuss Windows Server 2016 Virtualization, also known as Hyper-V 2016. Many Hyper-V components have evolved with each Microsoft release, and knowing this information is key to understanding the increased functionality and usability. Many of the new features require the basic usage of PowerShell. Read More

CSO Insider

1. 10 old-school security principles that (still) rule
2. Top security certifications: Who they're for, what they cost, and which you need
3. 5 top machine learning use cases for security
4. What are the GDPR requirements?
5. How hackers crack passwords and why you can't stop them

Editor's Picks

1. Best security software: How cutting-edge tools tackle today's threats
2. Spectre and Meltdown explained: What they are, how they work, what's at risk
3. What is two-factor authentication (2FA)? How to enable it and why you should
4. The best antivirus? Kaspersky leads in latest tests, but that's only part of the story
5. What is CVE, its definition and purpose?
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.