What it takes to be a security software developer

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jun 07, 2017
Featured Image

How computer security pros hack the hackers

If you want to meet a really smart hacker, talk to a cybersecurity defender. These talented professionals are working every day to make cybercrime harder and less lucrative. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What it takes to be a security software developer
25% off Logitech K780 Multi-Device Wireless Keyboard for Computer, Phone & Tablet - Deal Alert
Cybersecurity labor crunch to hit 3.5 million unfilled jobs by 2021

White Paper: Fortinet

A Security Leader's Definitive Guide to the Threat Landscape

The transition to a digital economy is requiring networks to evolve rapidly. Applications, data, and services need to flow faster, and in growing volumes, across an increasingly diverse landscape of users, domains, and devices. Therefore, how do you balance this change and opportunity with risk? IoT and cloudbased applications, services, and infrastructures require organizations to worry about an attack that may not even be visible to IT. Read More

Thumbnail Image
INSIDER

What it takes to be a security software developer

Developers with a security focus will be in strong demand, especially for financial, cloud and Internet of Things applications. Read More

Thumbnail Image
DealPost

25% off Logitech K780 Multi-Device Wireless Keyboard for Computer, Phone & Tablet - Deal Alert

Logitech's type-on-everything keyboard features easy switching between three devices, including any computer, tablet and smartphone. An integrated phone and tablet stand holds your devices at the perfect angle to type and read. Compatible with Mac and PC. Read More

Thumbnail Image

Cybersecurity labor crunch to hit 3.5 million unfilled jobs by 2021

The cyber crime epidemic is expected to triple the number of open cybersecurity positions to 3.5 million over the next five years. Read More

eGuide: Bromium

eGuide: Why a New Approach to Endpoint Protection Is Needed Now

The threat landscape is constantly evolving. Traditional and even next-gen solutions to endpoint protection are falling short in protecting the enterprise against all advanced malware, current and emerging. That's why a new approach that offers endpoint protection via virtualization-based security and secure platforms is needed. Read More

Top 5 Stories

1. Microsoft patches Windows XP and Server 2003 due to WannaCrypt attacks
2. Dealing with WannaCry on Monday morning, and the days ahead
3. Did Kaspersky step in dog-doo?
4. Paying the WannaCry ransom will probably get you nothing, here's why
5. Vendors approve of NIST password draft

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.