This hacker is rating software security Consumer Reports-style

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Jan 18, 2018
Featured Image

How do you secure the cloud? New data points a way

Two new reports show big differences in risk among public, private, and hybrid cloud deployments. Here’s advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

This hacker is rating software security Consumer Reports-style
200 cybersecurity startups that received venture capital in 2017
Crossbow offers live fire cybersecurity vulnerability testing
Data breached in translation
How hackers crack passwords and why you can't stop them
11 top tools to assess, implement, and maintain GDPR compliance

Video/Webcast: Fujitsu and VMware

Helping Organizations Transform by Leveraging Hybrid Cloud

Learn how to speed the modernization of your business. Understand how to safely leverage the power of cloud, how to use modern Digital enablement platforms, and get the best of both worlds with Hybrid IT. You will hear best practices and success stories that will alleviate the uncertainty in your quest for digital transformation. Partnering with Fujitsu and VMware will enable you to succeed in your journey to the cloud. Read More

Thumbnail Image

This hacker is rating software security Consumer Reports-style

Mudge's Cyber Independent Testing Lab (CITL) is fuzzing binaries at scale and building a checklist of compile-time security best practices. Read More

Thumbnail Image

200 cybersecurity startups that received venture capital in 2017

VC firms and corporate investors are fueling a trillion-dollar cybersecurity market. Read More

Thumbnail Image
INSIDER

Crossbow offers live fire cybersecurity vulnerability testing

The vulnerability assessment platform is one of the most realistic tools, but also one of the most dangerous, that CSO has ever reviewed. All of the attacks that it can load or create are real, using actual techniques and tactics that have historically broken through cybersecurity defenses at many organizations. Read More

Thumbnail Image
INSIDER

Data breached in translation

Online language translation software caused a data leak at Statoil. Use these best practices to keep translated information secure. Read More

Thumbnail Image
INSIDER

How hackers crack passwords and why you can't stop them

Password crackers have access to more stolen passwords and better password hacking software and tools than ever before. Read More

Thumbnail Image
INSIDER

11 top tools to assess, implement, and maintain GDPR compliance

Running behind on meeting the EU’s new GDPR privacy rules? These tools can help you meet the requirements and stay in compliance by deadline. Read More

Trial Download: SelectHub

Top ERP for Manufacturing 2018―Expert Reviews and Pricing―Free Analyst Report

Interactive analyst report gives you comparison ratings, reviews and pricing from actual software selection projects. Read More

CSO Insider

1. Top security certifications: Who they're for, what they cost, and which you need
2. How to jumpstart your infosec career
3. For strong API security, you need a program not a piecemeal approach
4. Security platform or best of breed? There’s only one answer
5. Keeping pace with security automation

Editor's Picks

1. What is SSL/TLS? (And why it’s time to upgrade to TLS 1.3)
2. Meltdown and Spectre patches: Where to start and what to expect
3. The dirty dozen: 12 top cloud security threats for 2018
4. Best Android antivirus? The top 10 tools
5. The 6 best password managers
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.