Credit card fraud: What you need to know now

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

May 11, 2018
Featured Image

5 top trends in endpoint security for 2018

Endpoint security is focused on locking down endpoints — individual computers, phones, tablets and other network-enabled devices — in order to keep networks safe. Of course, as threats evolve, endpoint security suites must evolve as well. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Credit card fraud: What you need to know now
Get a 299-Piece All-Purpose First Aid Kit For $12 Today
The 3 hidden costs of incident response
Give us 10 minutes of your time and you could win $500
How do you secure the cloud? New data points a way
6 takeaways (and 3 predictions) from CISO meetings at the RSA Conference

White Paper: Carbon Black

7 Experts on Moving to a Cloud-Based Endpoint Security Platform

For many companies, the modern business environment has become a mobile workplace in which employees work from wherever they happen to be. The fact that people continue to be the weakest security link has made mobile PCs and extended networks a sweet spot for attackers. So how are companies responding? Many are moving to cloud-based, next generation, Endpoint Security platforms. Read More

Thumbnail Image
INSIDER

Credit card fraud: What you need to know now

Credit and payment card thieves are getting more sophisticated as chipped cards drive them to account takeover and card-not-present schemes. Read More

Thumbnail Image
DealPost

Get a 299-Piece All-Purpose First Aid Kit For $12 Today

The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More

Thumbnail Image

The 3 hidden costs of incident response

Every business function seeks to apply finite resources to maximum benefit, and to do that effectively in security, like threats, requires a keen understanding of those costs that are known and those that are hiding. Read More

Thumbnail Image

Give us 10 minutes of your time and you could win $500

CSO is conducting our annual Security Priorities survey, and we invite you to participate. It will take no more than 10 minutes of your time and you can enter a sweepstakes to win a $500 cash prize. Read More

Thumbnail Image

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private, and hybrid cloud deployments. Here’s advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy. Read More

Thumbnail Image

6 takeaways (and 3 predictions) from CISO meetings at the RSA Conference

The most effective way for divining the current state of enterprise cybersecurity practices is to talk to a number of CISOs representing different industries and to distill those conversations into an overall model. Read More

Video/Webcast: NetApp

A Hybrid Cloud Architecture for Analytics, AI and Machine Learning

Any analytics pipeline needs to efficiently collect, store and transform data. Typically enterprises use Hadoop on-premises to do one more of these tasks. The traditional Hadoop architecture is a cluster of servers with direct attached storage. However this set up is inefficient in many respects. Watch this webcast to learn more. Read More

CSO Insider

1. Evaluating patch management software: 6 key considerations
2. Review: Protecting clouds with Cloud Defender from Alert Logic
3. How safe are your passwords? Real life rules for businesses to live by
4. Credit card fraud: What you need to know now
5. What’s new in ransomware?

Editor's Picks

1. Online voting is impossible to secure. So why are some governments using it?
2. Why securing containers and microservices is a challenge
3. RSA roundup: 5 security vendors CISOs need to be aware of
4. Data and privacy breach notification plans: What you need to know
5. How lean development improved software security at Fannie Mae
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.