The merging of enterprise and consumer identities means it’s time for a universal identity

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Aug 16, 2017
Featured Image

Attackers experimenting with CVE-2017-0199 in recent phishing attacks

Researchers at Trend Micro and Cisco's Talos have identified a new wave of Phishing attacks leveraging CVE-2017-0199, a previously-patched remote code execution vulnerability in the OLE (Windows Object Linking and Embedding) interface of Microsoft Office. These latest attacks have paired the vulnerability with others in an attempt to bypass warning messages, but the results were less than stellar. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The merging of enterprise and consumer identities means it’s time for a universal identity
31% off WD 4TB My Passport Portable External USB 3.0 Hard Drive - Deal Alert
DOJ demands 1.3 million IP addresses of visitors to Trump protest site
Cost of insider threats vs. investment in proactive education and technology
Greed drives malevolent insider to steal former employer's IP
Caution advised with information security surveys

eBook: Red Hat

Microservices vs. Service-Oriented Architecture

Using a container application platform for the deployment of microservices will allow you to truly see the benefit of breaking up application logic into logical individual components. As your application grows in usage and demand, using this approach will allow you to quickly scale the most utilized components instead of scaling the entire application. Read More

Thumbnail Image

The merging of enterprise and consumer identities means it’s time for a universal identity

The different ways enterprise and consumer identities are becoming even more similar and what we as a security community should do about that. Read More

Thumbnail Image
DealPost

31% off WD 4TB My Passport Portable External USB 3.0 Hard Drive - Deal Alert

Safely store massive amounts of photos, videos and music with this 4TB external drive from WD. Currently priced just $10 higher than its 3TB counterpart with this deal. Read More

Thumbnail Image

DOJ demands 1.3 million IP addresses of visitors to Trump protest site

DreamHost is fighting the government's search warrant to identify who visited an anti-Trump site, saying the warrant violates privacy laws and the Fourth Amendment. Read More

Thumbnail Image

Cost of insider threats vs. investment in proactive education and technology

When it comes to security, education- or technology-based solutions can potentially save organizations a significant amount of money. Read More

Thumbnail Image

Greed drives malevolent insider to steal former employer's IP

An insider leaves to set up his own competitive company, and he accesses his former employer's systems to steal IP and marketing plans — for two years. Read More

Thumbnail Image

Caution advised with information security surveys

Cybersecurity reports based on answers from respondents often produce misleading or inaccurate statistics, and they can lead to industry confusion. Read More

eBook: Red Hat

Platform-As-A-Service, Devops, and Application Integration

App demands are increasing, but the availability of resources is not. You need more apps faster, but you have to work with the resources and skills you have. According to a recent IDG research study for CIO, 92% of enterprise IT decision makers (ITDM) want to speed up application demand and delivery to meet increasing demand. Read More

CSO Insider

1. Database security face-off: IBM Guardium vs. Imperva SecureSphere Database Security
2. State of Cybercrime 2017: Security events decline, but not the impact
3. Container security: How Waratek blocks Java exploits
4. Patrolling network traffic with SecBI
5. Lacework unmasks hidden attackers amid data center and cloud chaos

Editor's Picks

1. Malicious code in the Node.js npm registry shakes open source trust model
2. The 10 Windows group policy settings you need to get right
3. Separation of duties and IT security
4. Why SSL/TLS attacks are on the rise
5. IT's 9 biggest security threats
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.