Blockchain: 'Overhyped' buzzword or real-deal enterprise solution?

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Apr 20, 2017
Featured Image

Most employees willing to share sensitive information, survey says

According to an end user security survey released this morning, 72 percent of employees are willing to share confidential information. In the financial services sector, the percentage was even higher -- 81 percent said they should share sensitive, confidential or regulated information. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Blockchain: 'Overhyped' buzzword or real-deal enterprise solution?
19% off TaoTronics LED Dimmable Touch Control Desk Lamp with USB Charging - Deal Alert
How to keep virtual assistants from sharing your company's secrets
Report: Cybercriminals prefer Skype, Jabber, and ICQ
The intersection of DevOps and application security
You can steal my identity, but not my behavior
Secure systems and the three little pigs

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image

Blockchain: 'Overhyped' buzzword or real-deal enterprise solution?

While blockchain technology may be a hotspot in data privacy, experts disagree about whether it’s a good fit for enterprises that have traditionally relied on centralized data control. Read More

Thumbnail Image
DealPost

19% off TaoTronics LED Dimmable Touch Control Desk Lamp with USB Charging - Deal Alert

This desk lamp features a sleek and minimalistic design with no buttons thanks to its creative touch sensitive panel, for control over multiple brightness and color temperature settings. Also features a USB port equipped with the iSmart technology for safer and faster charging. Read More

Thumbnail Image

How to keep virtual assistants from sharing your company's secrets

Consumers love talking to Alexa, Siri, Cortana and Google Now. But what should CIOs be doing to prepare for the growing use of virtual assistants among their employees? Read More

Thumbnail Image

Report: Cybercriminals prefer Skype, Jabber, and ICQ

The most popular instant messaging platforms with cyber criminals are Skype, Jabber and ICQ, according to a new report released this morning. Meanwhile, consumer-grade platforms like AOL Instant Messenger and Yahoo IM have fallen out of favor, while newer, more secure consumer oriented platforms like Telegram and WhatsApp are also gaining popularity. Read More

Thumbnail Image

The intersection of DevOps and application security

This article discusses DevOps security and the application security tools that need to be embedded within its process. These additions enable proper InfoSec protection of web applications. Read More

Thumbnail Image

You can steal my identity, but not my behavior

The compromise and misuse of identity is at the core of modern threats and data breaches. This has been documented for years and continues to escalate. As a result, we are rapidly approaching the end of life for password-based security and centralized access. Legacy controls and architecture are due for replacement. This article asks and answers "What should replace them?" Read More

Thumbnail Image

Secure systems and the three little pigs

How to create a secure systems development practice in spite of Agile, DevOps and changing threats Read More

White Paper: Turbonomic

The Path to Hybrid Cloud

In this whitepaper, we explore some of the players in Infrastructure-as-a-Service (IaaS) and hybrid cloud, the challenges surrounding effective implementation, and how to identify and time the bursting of appropriate workloads. Read More

Top 5 Stories

1. McAfee LinkedIn page hijacked
2. 5 must-have security tools
3. The 7 worst automation failures
4. How to jumpstart your infosec career
5. The rising security risk of the citizen developer

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.