Cybersecurity acquisitions, by the numbers

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jul 27, 2016
Featured Image

Many popular wireless keyboards completely unprotected

Many popular wireless keyboards on the market today use no encryption at all and are vulnerable to eavesdropping, according to a new report. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Cybersecurity acquisitions, by the numbers
Research shows Russia behind DNC email breach?
Verizon's Yahoo deal creates tracking powerhouse, privacy groups warn
Kimpton Hotels is investigating a possible payment card breach
NASA hires former Microsoft director, cybersecurity veteran as CISO

Video/Webcast: Endgame

The Endgame Hunt Cycle: Strategies from the Leader in Cyber Offense

The Endgame Hunt Cycle focuses solely on cyber offense and has redefined how enterprises hunt for never-before-seen adversaries within their network. Read More

Thumbnail Image

Cybersecurity acquisitions, by the numbers

Who's acquiring who in the cybersecurity industry? Read More

Thumbnail Image

Research shows Russia behind DNC email breach?

How are experts able to be detected nation state actors in the aftermath of a breach? Read More

Thumbnail Image

Verizon's Yahoo deal creates tracking powerhouse, privacy groups warn

Verizon's planned US$4.8 billion acquisition of Yahoo will create an international consumer tracking powerhouse that raises serious privacy concerns, some privacy advocates said. Read More

Thumbnail Image

Kimpton Hotels is investigating a possible payment card breach

Kimpton Hotels, operator of boutique hotels across the U.S., says it is investigating reports of a possible payment card data breach. If confirmed, it would become the latest in a string of successful attacks on hotel chain operators in the last year. Read More

Thumbnail Image

NASA hires former Microsoft director, cybersecurity veteran as CISO

NASA has tapped Jeanette Hanna-Ruiz as its new cybersecurity associate CIO for IT security and senior agency information security official (SAISO), effective Aug. 8. Read More

White Paper: Endgame

Whitepaper: Automate the Hunt

Learn how to hunt and evict never-before-seen adversaries within your network. Read More

Top 5 Stories

1. Hackers create Safe Skies TSA master key from scratch, release designs
2. How to remove malware from your Windows PC
3. Pokemon Go: What security awareness programs should be doing now
4. 8 of the most unsettling things you'll find on the darknet
5. New HIPAA guidance addresses ransomware

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.