Is the cyber crisis real or fiction?

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Mar 10, 2017
Featured Image

After CIA leak, Intel Security releases detection tool for EFI rootkits

Intel Security has released a tool that allows users to check if their computer's low-level system firmware has been modified and contains unauthorized code. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Is the cyber crisis real or fiction?
25% off iHome iPL23 Clock Radio with Lightning Dock, Support for iPhone 7/7+ - Deal Alert
Google tries to beat AWS at cloud security
WikiLeaks will share CIA hacking details with companies, but can they use it?
Danes targeted by malware spread through Dropbox
Newer car tech opens doors to CIA attacks

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

Is the cyber crisis real or fiction?

There has been a lot of commentary about the cybersecurity hiring crisis. Reports indicate that there are too few candidates for positions and there is no assurance that the future will be better. Is this reported crisis real? It may be that enterprises are not stepping up to train new candidates for cyber roles or not recognizing that cyber is how business has to be done and not just the responsibility of the designated security officer. Read More

Thumbnail Image
DealPost

25% off iHome iPL23 Clock Radio with Lightning Dock, Support for iPhone 7/7+ - Deal Alert

The iPL23 docking alarm clock radio & charging station supports iPhone 7/7+ and has been discounted on Amazon 25% to $59.95. Read More

Thumbnail Image

Google tries to beat AWS at cloud security

New tools that protect enterprise applications running on Google Cloud Platform may help take the spotlight away from AWS and Microsoft Azure Read More

Thumbnail Image

WikiLeaks will share CIA hacking details with companies, but can they use it?

WikiLeaks plans to share details about what it says are CIA hacking tools with the tech companies so that software fixes can be developed. But will software companies want it? Read More

Thumbnail Image

Danes targeted by malware spread through Dropbox

Earlier this week, Danish-speaking users were hit by malware spread through Dropbox, but the company responded quickly to shut down the attack Read More

Thumbnail Image

Newer car tech opens doors to CIA attacks

The revelation that the CIA has looked into hacking vehicles, possibly for the purpose of assassinations, flies in the face of a presidential order requiring U.S. agencies to reveal flaws to manufacturers to protect Americans. Read More

Video/Webcast: Hewlett Packard Enterprise

Your Digital Transformation Journey

How will you go about enabling digital transformation at your company? Joining two experts on digital transformation as they discuss what's at stake and how you can enable digital transformation at your company with the help of open source software. Read More

Top 5 Stories

1. Spammers expose their entire operation through bad backups
2. The 10 essential Reddits for security pros
3. Ransomware picks off broader targets with greater severity
4. Why the Ukraine power grid attacks should raise alarm
5. Why awareness needs to teach scam detection and reaction

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.