CSO Spotlight: Justin Berman, Zenefits

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jul 13, 2018
Featured Image

Apple insider attempts to take autonomous car secrets to China

Xiaolang Zhang, an Apple hardware engineer, harvested 40 gigs of data about the Apple Car and took a server and circuit boards prior to announcing his intent to join XMotors and return to China. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

CSO Spotlight: Justin Berman, Zenefits
$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert
Identity eats security: How identity management is driving security
What is the Tor Browser? How it works and how it can help you protect your identity online
10 ways to prevent, detect and recover from ransomware and zeroday threats
Staying secure as the IoT tsunami hits

White Paper: PTC

4 Reasons Remote Monitoring is Your Best Move to Better Service

Download this free e-book to discover how companies are realizing proven returns with IoT-enabled remote monitoring, which can be quickly implemented and monetized. Read More

Thumbnail Image
INSIDER

CSO Spotlight: Justin Berman, Zenefits

Being wrong is good, embrace it, learn from it and grow from it, advises Berman. Being an effective security leader is about recognizing that "your job is to get the best answer, not to have it." Read More

Thumbnail Image
DealPost

$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert

Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More

Thumbnail Image
INSIDER

Identity eats security: How identity management is driving security

New intelligent identity management systems are changing the way organizations authenticate users and devices, and they’re making identity the new security perimeter. Read More

Thumbnail Image

What is the Tor Browser? How it works and how it can help you protect your identity online

The Tor Browser is a web broswer that anonymizes your web traffic using the Tor network, making it easy to protect your identity online. Read More

Thumbnail Image

10 ways to prevent, detect and recover from ransomware and zeroday threats

As ransomware runs rife the threat of extortion and disruption looms large. Find out what practical steps you can take to prevent ransomware from gaining a foothold and to detect it when your defenses fail. Read More

Thumbnail Image

Staying secure as the IoT tsunami hits

The ubiquitous adoption of devices in virtually every industry is creating a massive, global security gap. Data science can help reign in the risks. Read More

White Paper: PTC

Remote Monitoring Provides Real-Time Information for Improved Servicing

In the "Quick Start Guide: Monitoring Equipment with IoT" eBook, Tech-Clarity, an independent manufacturing technology research firm, shows how manufacturers can use remote monitoring to quickly identify failures and efficiently repair equipment. Tech-Clarity provides actionable steps that manufacturers can take to connect remote equipment, gather the right data and put that data to use. Read More

Editor’s Picks

1. 11 tips for prioritizing security spending
2. Are bad analogies killing your security training program?
3. Security platform or best of breed? There’s only one answer
4. How to perform a risk assessment: Rethinking the process
5. The 5 best malware metrics you can generate
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.