The CSO guide to top security conferences

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jun 20, 2018
Featured Image
INSIDER

Hardware, software options emerge for runtime encryption

Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The CSO guide to top security conferences
$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert
China increases its surveillance state
Researchers disclose 7 flaws in 390 Axis IP cameras, remote attacker could take control
When your career is derailed by your girlfriend tampering with your email
Microsoft brings cloud security services to better protect Windows 10

Video/Webcast: EMA Analyst Research

LIVE WEBINAR: Using Digital Threat Intelligence Management (DTIM) to Combat Threats

Is the time right for your organization to purchase a threat intelligence platform? Join leading IT analyst firm EMA and IntSights for a research-based webinar to find out if DTIM is right for your organization. You will also get key insights into new research, including the methodology behind platform evaluation and an overview of key players in the market. Read More

Thumbnail Image

The CSO guide to top security conferences

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. Read More

Thumbnail Image
DealPost

$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert

Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More

Thumbnail Image

China increases its surveillance state

China plans to add bio-recognition technology to subways and to install RFID chips in vehicle windshields. Read More

Thumbnail Image

Researchers disclose 7 flaws in 390 Axis IP cameras, remote attacker could take control

If an attacker were to chain three of the flaws in the Axis IP cameras, they could remotely execute shell commands with root privileges. Update your firmware now. Read More

Thumbnail Image

When your career is derailed by your girlfriend tampering with your email

Eric Abramovitz, a gifted clarinetist, had opportunity squandered when his girlfriend executed a classic "business email compromise." Read More

Thumbnail Image
INSIDER

Microsoft brings cloud security services to better protect Windows 10

Windows 10 Advanced Threat Protection and new Microsoft 365 Business security features make it easier to detect threats ad stop cyber attacks. Read More

Case Study: Spectrum Enterprise

Nonstop Digital Connectivity Fires Up Fans and Revenue

H&S's performance is measured by attendance, big-name bookings and how much fans spend on merchandise and concessions. Digital innovation plays a crucial role in creating a thrilling live experience that raises fans' satisfaction and their average "spend." Read More

CSO Insider

1. Does it matter who the CISO reports to?
2. 8 hot cyber security trends (and 4 going cold)
3. What is the New York Cybersecurity Regulation? What you need to do to comply
4. The 10 Windows group policy settings you need to get right
5. Information security in a war zone: How the Red Cross protects its data

Editor's Picks

1. Ready for more secure authentication? Try these password alternatives and enhancements
2. What is a CASB? What you need to know before you buy
3. Cloud functions present new security challenges
4. Review: Seceon soups up standard SIEM
5. The IoT security basics survival guide
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.