Ready for more secure authentication? Try these password alternatives and enhancements

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Jun 10, 2018
Featured Image
INSIDER

Information security in a war zone: How the Red Cross protects its data

The International Committee of the Red Cross faces unique and extreme security threats across the globe. Technology is not always the best defense. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Ready for more secure authentication? Try these password alternatives and enhancements
What does a ransomware attack cost? Beware the hidden expenses
How risk-based authentication has become an essential security tool
Microsoft locks down Windows 10 with the S edition
What is Shodan? The search engine for everything on the internet
What is the New York Cybersecurity Regulation? What you need to do to comply

Case Study: Spectrum Enterprise

Nonstop Digital Connectivity Fires Up Fans and Revenue

H&S's performance is measured by attendance, big-name bookings and how much fans spend on merchandise and concessions. Digital innovation plays a crucial role in creating a thrilling live experience that raises fans' satisfaction and their average "spend." Read More

Thumbnail Image
INSIDER

Ready for more secure authentication? Try these password alternatives and enhancements

Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation. Read More

Thumbnail Image
INSIDER

What does a ransomware attack cost? Beware the hidden expenses

The ransom is only a tiny portion of the total cost of a ransomware attack. Consider these associated costs when estimating the total damage. Read More

Thumbnail Image
INSIDER

How risk-based authentication has become an essential security tool

A new generation of risk-based authentication (RBA) products can improve both customer experience and security. Here's what to look for in them. Read More

Thumbnail Image

Microsoft locks down Windows 10 with the S edition

New security features and limits on what you can load and customize promise to make Microsoft Windows 10 S the more secure version ever. It might not be for everyone, though. Read More

Thumbnail Image

What is Shodan? The search engine for everything on the internet

Defenders find this simple tool valuable for finding vulnerable devices attached to the web that need to be secured. Read More

Thumbnail Image
INSIDER

What is the New York Cybersecurity Regulation? What you need to do to comply

Officially called 23 NYCRR 500, this regulation requires financial services firms doing business in New York to have a full security risk assessment and plan. Read More

White Paper: Webroot Software

Why Efficacy is Paramount

Malware detection itself is not the only factor to consider when choosing an endpoint security solution. In addition to initial detection, comprehensive endpoint security must a number of things. Read more to find out. Read More

CSO Insider

1. Cloud functions present new security challenges
2. 5 tips to thwart medical device attacks
3. 14 top tools to assess, implement, and maintain GDPR compliance
4. Review: Seceon soups up standard SIEM
5. CSO Spotlight: Grant Bourzikas, McAfee

Editor's Picks

1. How to evaluate web authentication methods
2. The best new Windows 10 security features: The privacy edition
3. What is a CISO? And what it takes to become one
4. 7 highest-paying IT security jobs, 2018
5. What is cryptojacking? How to prevent, detect, and recover from it
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.