Is the blockchain good for security?

Email not displaying correctly? View it in your browser.

CSO

CSO Newswatch

Apr 01, 2016
Featured Image

FBI is cracking an iPhone in an Arkansas murder case

The FBI is helping Arkansas prosecutors break into an iPhone and iPad looking for evidence in a murder trial, and it’s without asking Apple for help. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Is the blockchain good for security?
Verizon's breach experts missed one right under their noses
Phishing attacks targeting W-2 data hit 41 organizations in Q1 2016
US accuses 7 Iranians of hacking US banks, New York dam
Public concerned about security flaws in government open source code
Stealthy USB Trojan hides in portable applications, targets air-gapped systems

White Paper: CommVault

5 Benefits of Disaster Recovery in the Cloud

This paper explores why the cloud is well suited for disaster recovery and what organizations need to consider to ensure that cloud DR is right for them. Read More

Thumbnail Image

Is the blockchain good for security?

The blockchain is now being hyped as the solution to all inefficient information processing systems, such as recording of property transfers, escrow services, and even legal contracts, but there are both security benefits and challenges to the technology Read More

Thumbnail Image

Verizon's breach experts missed one right under their noses

Verizon Enterprise, a bulwark against cyberattacks at many large organizations, has suffered a security breach itself. Read More

Thumbnail Image

Phishing attacks targeting W-2 data hit 41 organizations in Q1 2016

In the first quarter of 2016, more than three dozen businesses have been victimized by Phishing attacks targeting employee tax records. The scams have impacted organizations both large and small, playing on fear and basic human nature in order to succeed. Read More

Thumbnail Image

US accuses 7 Iranians of hacking US banks, New York dam

The U.S. government says seven Iranians working for the country's Islamic Revolutionary Guard Corps are responsible for 187 denial of service attacks aimed at banks across the U.S. from 2011 to 2013. Read More

Thumbnail Image

Public concerned about security flaws in government open source code

Earlier this month, the White House released a draft of an open source code policy for public review which would require agencies to share code with each other and with the public, but some experts are concerned about possible security implications. Read More

Thumbnail Image

Stealthy USB Trojan hides in portable applications, targets air-gapped systems

A Trojan program is being distributed through USB drives and seems to be designed for stealing information from so-called air-gapped computers that are not connected to the Internet. Read More

White Paper: CommVault

5 Steps to Migrate Your Applications to the Cloud Stress Free

This paper examines five easy ways to overcome concerns about managing increased data flows, and moving operations to the cloud and offers solutions to each concern. Read More

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Newswatch as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.