Report: Top 25 IT security products

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Apr 27, 2017
Featured Image

Ransomware attacks are taking a greater toll on victim's wallets

The hackers spreading ransomware are getting greedier. In 2016, the average fee to free computers hit with the notorious infection rose to $1077, up from $294 the year before, according to security firm Symantec. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Report: Top 25 IT security products
33% off MagicFiber Microfiber Cleaning Cloths For Screens and Other Delicate Surfaces, 30 Pack - Deal Alert
McAfee: Wave of Shamoon cyberattacks being coordinated by a single group
Microsoft adds another layer to the Windows 10 patching onion
Cyberespionage, ransomware big gainers in new Verizon breach report
Present and future ransomware tactics model the past
Latest OWASP Top 10 looks at APIs, web apps

Webcast: CA Technologies

Live Event: 3rd Annual DevOps Virtual Summit

Today's business leaders are transforming software delivery and building significant competitive advantage by successfully leveraging agile and DevOps methodologies in concert. Having spent countless hours recasting culture, advancing innovation and engaging greater levels of automation, related best practices now exist to be shared and further refined by all. Expanding DevOps adoption from pockets of early adoption across the entire software delivery lifecycle is the challenge that most organizations now face. Join us live March 7th for this virtual summit and get the real-world expertise and hands-on guidance available only from the industry's leading practitioners and DevOps evangelists. Read More

Thumbnail Image
INSIDER

Report: Top 25 IT security products

Download this exclusive report highlighting 25 top security products – as rated by actual enterprise users of the products – in categories such as cloud security, firewalls, SIEM, application security and IoT security. Read More

Thumbnail Image
DealPost

33% off MagicFiber Microfiber Cleaning Cloths For Screens and Other Delicate Surfaces, 30 Pack - Deal Alert

This extremely soft, high-quality and machine-washable microfiber material absorbs and safely removes dust, oil smudges, fingerprints, and dirt from eyeglasses, camera lenses, computer screens, televisions, and other delicate surfaces. Currently listed at 33% off for a 30-pack. Read More

Thumbnail Image

McAfee: Wave of Shamoon cyberattacks being coordinated by a single group

The latest campaigns are bigger, more sophisticated, and causing far more damage as the attackers learn new techniques and collaborate with other groups Read More

Thumbnail Image

Microsoft adds another layer to the Windows 10 patching onion

A new update will occur monthly, or sometimes more often. Read More

Thumbnail Image

Cyberespionage, ransomware big gainers in new Verizon breach report

Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016. Cyberspionage accounted for 21 percent of cases analyzed, up from 13 percent last year, and was the most common type of attack in the manufacturing, public sector, and education Read More

Thumbnail Image

Present and future ransomware tactics model the past

The way to understand, and avoid, becoming a victim of ransomware is to be prepared, said LEO Cyber Security CTO Andrew Hay. And part of that preparation is to understand its historical roots. Read More

Thumbnail Image

Latest OWASP Top 10 looks at APIs, web apps

The new release of the OWASP Top 10 list is out from the Open Web Application Security Project, and while most of it remains the same there are a couple of new additions, focusing on protections for web applications and APIs Read More

White Paper: NetApp

NetApp Data Fabric and the Essential Data Security Controls for Hybrid Clouds

Not only are diverse types of unstructured data growing at a phenomenal rate, but data is being created and stored in an increasingly distributed fashion- across on-premises infrastructures, colocation centers, and public clouds- which further complicates the security challenge. Read More

Top 5 Stories

1. Can you spot the phish?
2. There's now a tool to test for NSA spyware
3. Healthcare records for sale on Dark Web
4. McAfee LinkedIn page hijacked
5. 10 interview questions for hiring cloud-literate security staff

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.