Symantec: Diverse threats remain a consistent problem online

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Mar 22, 2018
Featured Image
INSIDER

Review: Bricata adds threat hunting to traditional IPS/IDS

Bricata offers advanced IPS/IDS protection, but also goes a step farther, adding the ability to launch threat hunts based on events, or simply anomalies. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Symantec: Diverse threats remain a consistent problem online
8 security tools and tips for journalists
The future of computer security is machine vs machine
8 questions to ask about your industrial control systems security
GDPR is more important than ever: The Cambridge Analytica-Facebook meltdown
Is your vendor being honest about AI?

White Paper: Tempered Networks

Identity-Based Software-Defined Networking Brings Control and Simplicity

The concept of Identity-Defined Networking, which enables the creation of instant overlay networks that are inherently secure and mobile - with no changes to the existing underlay network - appeals to 98% of survey respondents. Read More

Thumbnail Image

Symantec: Diverse threats remain a consistent problem online

A new report from Symantec outlines the rocky year consumers and business owners had online in 2017, covering everything from coin mining attacks, problems in the supply chain, ransomware, BEC attacks, and more. Read More

Thumbnail Image

8 security tools and tips for journalists

Journalists have a giant red target on their backs. How can we defend ourselves? Read More

Thumbnail Image
INSIDER

The future of computer security is machine vs machine

Better security automation at the OS level and via cloud services will force hackers to respond in kind. Read More

Thumbnail Image

8 questions to ask about your industrial control systems security

Do you have a real cybersecurity-focused ICS strategy in place, or are you force-fitting IT security policies on your industrial control systems? Read More

Thumbnail Image

GDPR is more important than ever: The Cambridge Analytica-Facebook meltdown

Why its critical – existential in fact – for us to do our own “analytica” in this day and age. Read More

Thumbnail Image

Is your vendor being honest about AI?

Some vendors who claim their products use artificial intelligence or machine learning technology are really using rules-based engines. Here's how to spot the lie. Read More

White Paper: Allytics

Relativity Trust: Understanding Security in RelativityOne

Security is integral to who we are at Relativity-from our people and operations, to how we design RelativityOne and the foundation we build on in Microsoft Azure. Our commitment to make RelativityOne the most trusted and reliable cloud solution extends beyond ISO 27001 compliance. These are the tenets of Relativity Trust. Download this white paper for the details, from hiring practices to password policies to penetration tests. Read More

CSO Insider

1. Security vs. visibility: Why TLS 1.3 has data center admins worried
2. 8 hot cyber security trends (and 4 going cold)
3. 5 top machine learning use cases for security
4. Top security certifications: Who they're for, what they cost, and which you need
5. How to write an information security policy

Editor's Picks

1. 10 security buzzwords that need to be put to rest
2. The buck stops here: 8 security breaches that got someone fired
3. 12 famous (and infamous) IT security disasters
4. 15 real-world phishing examples — and how to recognize them
5. The 10 sneakiest hacker attacks
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.