Cloud security configuration errors put data at risk; new tools can help

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jan 29, 2018
Featured Image
Video

Ready for the EU's GDPR compliance deadline? Many companies aren't | Salted Hash Ep 16

CSO senior editor Michael Nadeau joins host Steve Ragan to talk about predictions for 2018, including the looming GDPR compliance deadline. Watch Now

Twitter Facebook LinkedIn

Your Must-Read Stories

Cloud security configuration errors put data at risk; new tools can help
Amazon Is Offering a $40-Off Deal On Its Echo Spot Devices
2 bad updates later, Malwarebytes released fix for high CPU and RAM usage
Top 5 cybersecurity facts, figures and statistics for 2018
So you want to be a pen tester? Here are the basics and requirements
Cybersecurity M&A deal flow: List of 200 transactions in 2017

eBook: Iovation

Multi-Factor Authentication for Dummies

This book introduces IT professionals to next-generation multi-factor authentication (MFA), an approach to authentication that goes well beyond usernames and passwords to provide the right level of security assurance at the right time, anytime Read More

Thumbnail Image
INSIDER

Cloud security configuration errors put data at risk; new tools can help

As more and more companies move to the cloud, misconfigured services are putting data and systems at risk. New management tools can help. Read More

Thumbnail Image
DealPost

Amazon Is Offering a $40-Off Deal On Its Echo Spot Devices

For the first time, Amazon has discounted its Echo Spot device by $40 when you buy a pair of them. Read More

Thumbnail Image

2 bad updates later, Malwarebytes released fix for high CPU and RAM usage

Malwarebytes pushed out a protection update that gobbled up memory and CPU resources and turned off web protection; the first fix still left users with unusable or crashing computers, but the latest release resolved the issue. Read More

Thumbnail Image

Top 5 cybersecurity facts, figures and statistics for 2018

Predictions and observations provide a 30,000-foot view of the cybersecurity industry. Read More

Thumbnail Image

So you want to be a pen tester? Here are the basics and requirements

Penetration testing, or ethical hacking, is an in-demand skill for evaluating an organization’s defenses. Here’s what it entails and tips for breaking into the role. Read More

Thumbnail Image

Cybersecurity M&A deal flow: List of 200 transactions in 2017

Rising tide of mergers and acquisitions in the trillion-dollar cybersecurity market. Read More

Video/Webcast: Neustar Inc

2018 DDoS Security Guidance

Join us for this webinar to get all of the details on next generation DDoS threats and what you can do to protect your organization. Read More

CSO Insider

1. Top security certifications: Who they're for, what they cost, and which you need
2. How to jumpstart your infosec career
3. For strong API security, you need a program not a piecemeal approach
4. Security platform or best of breed? There’s only one answer
5. Keeping pace with security automation

Editor's Picks

1. What is SSL/TLS? (And why it’s time to upgrade to TLS 1.3)
2. Meltdown and Spectre patches: Where to start and what to expect
3. The dirty dozen: 12 top cloud security threats for 2018
4. Best Android antivirus? The top 10 tools
5. The 6 best password managers
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.