Editor’s Note: Welcome, Computerworld newsletter subscribers

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jun 15, 2017
Featured Image

Don't rely on linguistics to identify cyber attackers

The security whodunnit: analyzing the language used in an attack is just one tool to assign attribution, and it’s not always reliable. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Editor’s Note: Welcome, Computerworld newsletter subscribers
Today's Your Last Chance To Buy Dad A Discounted Echo or Kindle Device - Deal Alert
Mobile app developers: Make sure your back end is covered
Don’t like Mondays? Neither do attackers
IDG Security Day features events in 10 countries

White Paper: Sophos Inc

Exploits. Intercepted.

Exploits are one of the main techniques used by cybercriminals to spread malware. They take advantage of weaknesses in legitimate software products like Flash and Microsoft Office to infect computers for their criminal ends. A single exploit can be used by myriad separate pieces of malware, all with different payloads. Read More

Editor’s Note: Welcome, Computerworld newsletter subscribers

Dear subscribers to Computerworld’s Security Issues and Trends newsletter. You are receiving this newsletter as the result of a merging of newsletter lists across CSO and Computerworld. We hope you'll find it valuable, but you can unsubscribe at any time by going to the newsletter signup page (http://www.csoonline.com/newsletters/signup.html). Read More

Thumbnail Image
DealPost

Today's Your Last Chance To Buy Dad A Discounted Echo or Kindle Device - Deal Alert

Amazon's discounted their devices for Father's day, but time is running out. If you're in panic mode and still need a gift, check out the discounted Echo, Echo Dot or Kindle. Pull the trigger today for free Prime 2-day shipping (hint: if you don't have Prime, get the free trial). Read More

Thumbnail Image

Mobile app developers: Make sure your back end is covered

Developers need to make sure they are baking security into the application code and protecting how their apps handle data, but as the so-called HospitalGown security issue shows, they also need to know how the back-end servers and data stores are being configured. Read More

Thumbnail Image

Don’t like Mondays? Neither do attackers

You can reduce potential damage by paying attention to when attackers are most likely to strike. Read More

Thumbnail Image

IDG Security Day features events in 10 countries

On June 21, IDG Enterprise will follow the sun and discuss the challenges organizations across the globe face when attempting to identify or mitigate risk. To do this, IDG has organized Security Day, a global event that is coming to Tyson's Corner in McLean, VA. The U.S. segment will be hosted by CSO's own Bob Bragdon, and includes a stellar lineup of experts and insiders. Read More

White Paper: Sophos Inc

Firewall Buyers Guide

With firewalls becoming increasingly complex, buying one can be a confusing experience. And even when you've identified requirements you need for your firewall, trudging through each vendor's website and datasheets is a time-consuming process. This guide has been designed to make finding the right firewall easy for you. It pulls together the critical capabilities and features that all firewalls should have. Read More

CSO Insider

1. 4 places to find cybersecurity talent in your own organization
2. What it takes to be a security software developer
3. How to write an information security policy
4. Contract obligations, third parties, and cyber insurance
5. Red team versus blue team: How to run an effective simulation

Editor's Picks

1. Why you don't need an RFID-blocking wallet
2. Recap: News agency hack blamed for diplomatic meltdown in Qatar
3. How computer security pros hack the hackers
4. FireEye 2.0: Cyberhumans as a Service
5. Cybersecurity labor crunch to hit 3.5 million unfilled jobs by 2021
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.