What is a zero-day exploit? A powerful but fragile weapon

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jun 25, 2018
Featured Image

Controlling smart devices for domestic abuse

Don't blame hackers but your ex if your connected devices are being remotely controlled; it's a new pattern of domestic abuse behavior and some victims have been made to look crazy when explaining how they are being watched or how the devices act haunted. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What is a zero-day exploit? A powerful but fragile weapon
$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert
Review: How InSpec 2.0 delivers comprehensive compliance
Hardware, software options emerge for runtime encryption
Microsoft brings cloud security services to better protect Windows 10
Does it matter who the CISO reports to?

Video/Webcast: EMA Analyst Research

LIVE WEBINAR: Using Digital Threat Intelligence Management (DTIM) to Combat Threats

Is the time right for your organization to purchase a threat intelligence platform? Join leading IT analyst firm EMA and IntSights for a research-based webinar to find out if DTIM is right for your organization. You will also get key insights into new research, including the methodology behind platform evaluation and an overview of key players in the market. Read More

Thumbnail Image

What is a zero-day exploit? A powerful but fragile weapon

A zero-day is a security flaw that has not yet been patched by the vendor and can be exploited. These vulnerabilities fetch high prices on the black market Read More

Thumbnail Image
DealPost

$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert

Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More

Thumbnail Image
INSIDER

Review: How InSpec 2.0 delivers comprehensive compliance

The InSpec 2.0 platform from Chef tackles compliance head-on, tailored to the specific rules and guidelines that a company wants or needs. It is designed to both make sense of regulatory and technical guidelines and ensure that a network is protected according to those rules. Read More

Thumbnail Image
INSIDER

Hardware, software options emerge for runtime encryption

Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps. Read More

Thumbnail Image
INSIDER

Microsoft brings cloud security services to better protect Windows 10

Windows 10 Advanced Threat Protection and new Microsoft 365 Business security features make it easier to detect threats ad stop cyber attacks. Read More

Thumbnail Image
INSIDER

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness. Read More

White Paper: Webroot Software

Why Efficacy is Paramount

Malware detection itself is not the only factor to consider when choosing an endpoint security solution. In addition to initial detection, comprehensive endpoint security must a number of things. Read more to find out. Read More

CSO Insider

1. Does it matter who the CISO reports to?
2. 8 hot cyber security trends (and 4 going cold)
3. What is the New York Cybersecurity Regulation? What you need to do to comply
4. The 10 Windows group policy settings you need to get right
5. Information security in a war zone: How the Red Cross protects its data

Editor's Picks

1. Ready for more secure authentication? Try these password alternatives and enhancements
2. What is a CASB? What you need to know before you buy
3. Cloud functions present new security challenges
4. Review: Seceon soups up standard SIEM
5. The IoT security basics survival guide
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.