Thousands of critical energy and water systems exposed online for anyone to exploit

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Oct 31, 2018
Featured Image
INSIDER

Is your security operations center TTP0?

The new TTP0 community wants to do for SOCs what OWASP has done for web security. It will help CISOs improve their threat intelligence and threat hunting capabilities as well. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Thousands of critical energy and water systems exposed online for anyone to exploit
This Platform Is Making Management of Apple Devices Easy
Cyber threats fueled by AI: Security's next big challenge
Biggest data breach penalties for 2018
Why the best antivirus software isn't enough (and why you still need it)
Top cybersecurity facts, figures and statistics for 2018
Thumbnail Image

Thousands of critical energy and water systems exposed online for anyone to exploit

Critical functions such as starting or stopping a system can be accessed online by anyone, be it nation-state attackers or script kiddies. Read More

Thumbnail Image
DealPost

This Platform Is Making Management of Apple Devices Easy

Jamf Now is a cloud-based solution that delivers Apple management and security with just a few minutes of setup. Read More

Thumbnail Image
INSIDER

Cyber threats fueled by AI: Security's next big challenge

Security has always been an arms race. But the addition of AI is like jumping from tomahawks to Tomahawk missiles. Read More

Thumbnail Image

Biggest data breach penalties for 2018

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes, have cost these eight companies a total of nearly $280 million and counting. Read More

Thumbnail Image
INSIDER

Why the best antivirus software isn't enough (and why you still need it)

Antivirus software can’t keep up with new malware or variants of known malware, but it still plays a role in an overall endpoint protection strategy. Read More

Thumbnail Image

Top cybersecurity facts, figures and statistics for 2018

Looking for hard numbers to back up your sense of what's happening in the cybersecurity world? We dug into studies and surveys of the industry's landscape to get a sense of the lay of the land—both in terms of what's happening and how your fellow IT pros are reacting to it. Read More

Editor’s Picks

1. 10 essential enterprise security tools (and 11 nice-to-haves)
2. 7 best practices for negotiating ransomware payments
3. Are long passphrases the answer to password problems?
4. Bruce Schneier's Click Here to Kill Everybody reveals the looming cybersecurity crisis
5. Cybercriminals are using blockchain to improve security. Should you?
6. 5 hard truths every CISO should know
7. What it takes to be a security consultant

Get Security Smart

From the editors of CSO, Security Smart is a quarterly security awareness newsletter ready for distribution in your organization. Subscribe now and arm your employees with the information they need to be more secure at home and at work. Learn more.
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.