Bug bounties offer legal safe harbor. Right? Right?

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Aug 09, 2018
Featured Image

Inside Dropbox and Microsoft Office phishing attacks

This phishing attacks has a few interesting elements, including a weak attempt to spoof an HTTPS connection, and a sort of hybrid lure, which starts as Dropbox but ends at Microsoft Office. We'll show you how it works. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Bug bounties offer legal safe harbor. Right? Right?
What is malware? Viruses, worms, trojans, and beyond
Preparing for the day quantum computing cracks public-key cryptography: What to do now
Do you need a vulnerability disclosure program? The feds say yes
Baby steps: building a cybersecurity strategy

White Paper: Hitachi ID Systems, Inc.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More

Thumbnail Image
INSIDER

Bug bounties offer legal safe harbor. Right? Right?

Bug bounties are all the rage, but many programs do not offer legal safe harbor to good-faith security researchers who wish to report security issues. Caveat bug finder. Read More

Thumbnail Image

What is malware? Viruses, worms, trojans, and beyond

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it. Read More

Thumbnail Image
INSIDER

Preparing for the day quantum computing cracks public-key cryptography: What to do now

Quantum computers could crack public-key encryption in as little as five years. Here's how to prepare for the post-quantum world. Read More

Thumbnail Image

Do you need a vulnerability disclosure program? The feds say yes

The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports. Read More

Thumbnail Image

Baby steps: building a cybersecurity strategy

Building a cyber strategy can be overwhelming unless you start with large goals broken down into smaller milestones. Read More

White Paper: Bronze Drum Consulting

How Powerful New Technologies are Powering a Real-Time Revolution in Capital Markets

Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More

Editor’s Picks

1. How to conduct a proper GDPR audit: 4 key steps
2. 5 tips for getting started with DevSecOps
3. What it takes to build a zero trust network
4. How to perform a risk assessment: Rethinking the process
5. 11 tips for prioritizing security spending
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.