Risk management is all about the data; security should be, too

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jan 10, 2018
Featured Image

Meltdown and Spectre patches: Where to start and what to expect

You need to apply Meltdown and Spectre patches to pretty much everything in your enterprise. And you need to start now. We help you prioritize. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Risk management is all about the data; security should be, too
Anker's Twin USB High Speed Car Phone Charger Is Just $8.99 Right Now
What is DevSecOps? Developing more secure applications
5 top machine learning use cases for security
For strong API security, you need a program not a piecemeal approach
Keeping pace with security automation

White Paper: Amazon Web Services

AWS Cloud Transformation Maturity Model

The AWS Cloud Transformation Maturity Model (CTMM) maps the maturity of an IT organization's process, people, and technology capabilities as they move through the four stages of the journey to the AWS Cloud: project, foundation, migration, and optimization. Read More

Thumbnail Image

Risk management is all about the data; security should be, too

Bay Dynamics takes a data-driven approach to helping companies identify and address the real security threats based on asset value. Read More

Thumbnail Image
DealPost

Anker's Twin USB High Speed Car Phone Charger Is Just $8.99 Right Now

The car charger, which is typically priced around $12, is available for $9 right now on Amazon, where it averages 4.7 out of 5 stars from over 500 customers. Read More

Thumbnail Image

What is DevSecOps? Developing more secure applications

DevSecOps is about introducing security earlier in the life cycle of application development, thus minimizing vulnerabilities and bringing security closer to IT and business objectives. Read More

Thumbnail Image
INSIDER

5 top machine learning use cases for security

Machine learning will make sense of the security threats your organization faces and help your staff focus on more valuable, strategic tasks. It could also be the answer to the next WannaCry. Read More

Thumbnail Image
INSIDER

For strong API security, you need a program not a piecemeal approach

When designed and managed properly, APIs can be less problematic than traditional integration methods and can actually increase an organization's security posture. Read More

Thumbnail Image
INSIDER

Keeping pace with security automation

Stressed and stretched, IT security teams look to automation for relief. Read More

White Paper: Amazon Web Services

EBOOK: Building a Data Lake on AWS

Today's organizations are tasked with managing multiple data types, coming from a wide variety of sources. Faced with massive volumes and heterogeneous types of data, organizations are finding that in order to deliver insights in a timely manner, they need a data storage and analytics solution that offers more agility and flexibility than traditional data management systems. Read More

CSO Insider

1. 5 top machine learning use cases for security
2. Security platform or best of breed? There’s only one answer
3. Is source code inspection a security risk? Maybe not, experts say
4. Crossbow offers live fire cybersecurity vulnerability testing
5. Data breached in translation

Editor's Picks

1. Spectre and Meltdown: What you need to know going forward
2. Password managers grow up, target business users
3. How 3 innovative products approach network security
4. 17 steps to being completely anonymous online
5. The dirty dozen: 12 top cloud security threats for 2018
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.