Cybersecurity operations more difficult than it was 2 years ago

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jul 18, 2017
Featured Image

MQTT is not evil, just not always secure

The MQTT messaging protocol standard used by IoT vendors is not inherenly secure enough. Solutions exist to secure it, but organizations and vendors must assess risk and properly configure IoT and network security. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Cybersecurity operations more difficult than it was 2 years ago
40% off Inateck USB 3.0 to IDE/SATA Hard Drive Adapter - Deal Alert
Elon Musk’s top cybersecurity concern: Preventing a fleet-wide hack of Teslas
3 compliance considerations for containerized environments
Can computer science education be fun?

White Paper: Absolute Software

At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed

Be it malicious or well-intentioned, the most hazardous use of 'Shadow IT' is probably the simplest. Storing files in the cloud using cloud-sync applications is common practice for backing up or sharing files with co-workers. While these tools are believed to be secure, the true point of failure is the 'Insider Threat,' and only true visibility and a preventive approach can unmask the threat and mitigate the risk. Read More

Cybersecurity operations more difficult than it was 2 years ago

New ESG research finds more threats, more work and more alerts make it difficult for cybersecurity professionals to keep up. Read More

Thumbnail Image
DealPost

40% off Inateck USB 3.0 to IDE/SATA Hard Drive Adapter - Deal Alert

This USB 3.0 adapter from Inateck can interface with up to three drives simultaneously. It is compatible with 2.5"/3.5" IDE/SATA hard drives and 5.25" IDE/SATA CD/DVD drives, and features a one-touch backup function. Read More

Thumbnail Image

Elon Musk’s top cybersecurity concern: Preventing a fleet-wide hack of Teslas

Elon Musk discussed his top security concern, preventing a fleet-wide hack of Teslas, and the AI threat to humanity. Read More

Thumbnail Image

3 compliance considerations for containerized environments

Compliance needs to transition into an ongoing activity that can be done continuously through software and deliver both visibility and policy enforcement. Read More

Thumbnail Image

Can computer science education be fun?

Games that focus on concepts over programming languages teach students to think like a computer while having a little fun. Read More

Video/Webcast: Dell Inc

Dell EMC Ready Solutions

For many customers upgrading to SQL Server 2016, it is often a fork-lift endeavor. The Dell EMC Ready Bundle is designed to simply the implementation process. It is an expert-designed and validated data center solution based on the industry best practices. It delivers superior performance, exceptional scalability and faster time to value. Last but not least, cost saving for customers. Read More

CSO Insider

1. How computer security pros hack the hackers
2. How and why to hire a CISO
3. Don’t like Mondays? Neither do attackers
4. Crowdsourcing application security closes the automated assessment gap
5. Two years after the OPM data breach: What government agencies must do now

Editor's Picks

1. 7 elements of a successful security awareness program
2. A Blue Team's reference guide to dealing with ransomware
3. How to spot and prevent insider threats
4. The fault for ransomware attacks lies with the challenges security teams face
5. Security problems exist despite CIP compliance
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.