What is the biggest threat from the Equifax breach? Account takeovers

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Sep 13, 2017
Featured Image

BlueBorne is Bluetooth's Stagefright moment

The scariest thing about BlueBorne, the attack vector that uses Bluetooth to spread across devices, isn't what it can do, but rather just how many similar vulnerabilities may be lurking that we don't yet know about. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What is the biggest threat from the Equifax breach? Account takeovers
Amazon Discounts Fire 7 by $15, Fire HD 8 by $25 For Prime Members - Deal Alert
Rapid7 CEO: Rethink IT and security organizational structures
DNSSEC key signing key rollover: Are you ready?

White Paper: Riverbed Technology

Digital Spotlight: Ask the WAN Expert

That SD-WANs will replace routing was not the most important message from a recent Gartner webinar with Gartner vice president and distinguished analyst Joe Skorupa. No, the biggest message came in some startling statistics. Half the market revenue is held by just two startups, which begs the question: With 30-plus vendors in the SD-WAN space, are you sure the SD-WAN vendor you're considering has the cash for the long haul? Read More

Thumbnail Image

What is the biggest threat from the Equifax breach? Account takeovers

Cyber criminals have the most to gain by taking ownership of bank, brokerage and retirement accounts using people’s PII. Are traditional authentication systems obsolete? Read More

Thumbnail Image
DealPost

Amazon Discounts Fire 7 by $15, Fire HD 8 by $25 For Prime Members - Deal Alert

Amazon's best-selling tablets feature vibrant displays, generous battery life, Alexa, parental controls, and everything you need to surf, check email, watch Netflix, read books, and more. Prime members can get a discount right now. Read More

Thumbnail Image

Rapid7 CEO: Rethink IT and security organizational structures

Corey Thomas sees siloed operations as a root cause of security vulnerabilities and a barrier to innovation and better user experience. Read More

Thumbnail Image

DNSSEC key signing key rollover: Are you ready?

Enterprises that rely on the DNSSEC protocol need to update their name servers before Oct. 11 with the new root zone key signing key or risk having DNSSEC validations fail. Read More

White Paper: AppDynamics

10 Things Your CIO Should Know About DevOps

DevOps has taken the IT world by storm over the last few years and continues to transform the way organizations develop, deploy, monitor, and maintain applications, as well as modifying the underlying infrastructure. DevOps has quickly evolved from a niche concept to a business imperative and companies of all sizes should be striving to incorporate DevOps tools and principles. Read More

CSO Insider

1. Six entry-level cybersecurity job seeker failings
2. Separation of duties and IT security
3. 5 reasons to take a fresh look at your security policy
4. Free course: Windows virus and malware troubleshooting
5. InfoZen enables pre-deployment patching for DevOps coding

Editor's Picks

1. Credit card fraud: What you need to know now
2. The 5 cyber attacks you're most likely to face
3. Disaster recovery vs. security recovery plans: Why you need separate strategies
4. How safe are your passwords? Real life rules for businesses to live by
5. Famous malware threats: Where are they now?
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.