What is OAuth? What security pros need to know

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Aug 17, 2017
Featured Image

The best enterprise anti-virus protection may not be enough

Ransomware and other threats often get through signature-based anti-virus protection, giving it a bad rap. However, anti-virus tools still play an important role in the enterprise security strategy. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What is OAuth? What security pros need to know
Skilled bad actors use new pulse wave DDoS attacks to hit multiple targets
Kaspersky discovers supply-chain attack at NetSarang
Top security tools of 2017

Case Study: A10 Networks

Case Study: Cash Goes Virtual

Handle Financial, a financial technology provider, implements A10 LightningTM ADC to manage, control and secure workloads in the public cloud and significantly reduce operating expenses. Read More

Thumbnail Image

What is OAuth? What security pros need to know

The OAuth open authorization framework allows websites and services to share assets among users. It is widely accepted, but be aware of its vulnerabilities. Read More

Thumbnail Image

Skilled bad actors use new pulse wave DDoS attacks to hit multiple targets

In a new type of DDoS attack, skilled bad actors use pulse wave DDoS assaults to exploit weaknesses in appliance-first hybrid mitigation solutions and pin down multiple targets. Read More

Thumbnail Image

Kaspersky discovers supply-chain attack at NetSarang

While investigating suspicious DNS requests for a financial institution, researchers at Kaspersky discovered backdoor in recently updated copies of software released by NetSarang, a developer of management tools for servers and clients. Kaspersky linked the backdoor to the ShadowPad family of malware, and alerted the software firm, who then pulled the hijacked releases and alerted customers. Read More

Thumbnail Image

Top security tools of 2017

From deception and endpoint security to cloud security and traffic analysis, we review some of the most innovative and useful security tools from today's most important cybersecurity technology categories. Read More

eBook: Red Hat

Microservices vs. Service-Oriented Architecture

Using a container application platform for the deployment of microservices will allow you to truly see the benefit of breaking up application logic into logical individual components. As your application grows in usage and demand, using this approach will allow you to quickly scale the most utilized components instead of scaling the entire application. Read More

CSO Insider

1. Database security face-off: IBM Guardium vs. Imperva SecureSphere Database Security
2. State of Cybercrime 2017: Security events decline, but not the impact
3. Container security: How Waratek blocks Java exploits
4. Patrolling network traffic with SecBI
5. Lacework unmasks hidden attackers amid data center and cloud chaos

Editor's Picks

1. Malicious code in the Node.js npm registry shakes open source trust model
2. The 10 Windows group policy settings you need to get right
3. Separation of duties and IT security
4. Why SSL/TLS attacks are on the rise
5. IT's 9 biggest security threats
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.