What is a zero-day exploit? A powerful but fragile weapon

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Jun 26, 2018
Featured Image

4 scams that illustrate the one-way authentication problem

These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What is a zero-day exploit? A powerful but fragile weapon
Does it matter who the CISO reports to?
What is a CASB? What you need to know before you buy
Information security in a war zone: How the Red Cross protects its data
Hardware, software options emerge for runtime encryption

Video/Webcast: EMA Analyst Research

LIVE WEBINAR: Using Digital Threat Intelligence Management (DTIM) to Combat Threats

Is the time right for your organization to purchase a threat intelligence platform? Join leading IT analyst firm EMA and IntSights for a research-based webinar to find out if DTIM is right for your organization. You will also get key insights into new research, including the methodology behind platform evaluation and an overview of key players in the market. Read More

Thumbnail Image

What is a zero-day exploit? A powerful but fragile weapon

A zero-day is a security flaw that has not yet been patched by the vendor and can be exploited. These vulnerabilities fetch high prices on the black market Read More

Thumbnail Image
INSIDER

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness. Read More

Thumbnail Image

What is a CASB? What you need to know before you buy

Cloud access security brokers have come a long way in a few years and can be an effective way to manage authentication and encryption across cloud and on-premise systems. Read More

Thumbnail Image
INSIDER

Information security in a war zone: How the Red Cross protects its data

The International Committee of the Red Cross faces unique and extreme security threats across the globe. Technology is not always the best defense. Read More

Thumbnail Image
INSIDER

Hardware, software options emerge for runtime encryption

Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps. Read More

White Paper: Webroot Software

Why Efficacy is Paramount

Malware detection itself is not the only factor to consider when choosing an endpoint security solution. In addition to initial detection, comprehensive endpoint security must a number of things. Read more to find out. Read More

CSO Insider

1. Does it matter who the CISO reports to?
2. 8 hot cyber security trends (and 4 going cold)
3. What is the New York Cybersecurity Regulation? What you need to do to comply
4. The 10 Windows group policy settings you need to get right
5. Information security in a war zone: How the Red Cross protects its data

Editor's Picks

1. Ready for more secure authentication? Try these password alternatives and enhancements
2. What is a CASB? What you need to know before you buy
3. Cloud functions present new security challenges
4. Review: Seceon soups up standard SIEM
5. The IoT security basics survival guide
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.