Salted Hash Ep 26: Deception technologies that camouflage the network

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

May 23, 2018
Featured Image
INSIDER

Review: Gazing through a hacker’s lens with RiskIQ Digital Footprint

Requiring no setup or installation, Digital Footprint scans for vulnerability information from outside the firewall ... just like a potential attacker would. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Salted Hash Ep 26: Deception technologies that camouflage the network
$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert
Scapegoating security researchers harms society
The 5 best malware metrics you can generate
How risk-based authentication has become an essential security tool
Honeypots as deception solutions: What to look for and how to buy

White Paper: Palo Alto Networks

10 Things Your Next Firewall Must Do

As the leader and pioneer of the next-generation firewall category, Palo Alto Networks would like to share what we have learned from securing over 3,500 enterprise networks in the past few years. Download our guide that depicts the top 10 requirements you should demand in your next firewall purchase. Read More

Thumbnail Image

Salted Hash Ep 26: Deception technologies that camouflage the network

Sometimes, the best defense is awareness. At their core, deception technologies can assist in this process, but what's the difference between a deception vendor and a honey pot? Read More

Thumbnail Image
DealPost

$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert

Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More

Thumbnail Image
INSIDER

Scapegoating security researchers harms society

Want your government to stop punishing the security community for its own lapses? Become a better teacher and advocate for what you do. Read More

Thumbnail Image
INSIDER

The 5 best malware metrics you can generate

Are you asking the right computer security questions? If you can answer these five, you'll know better how to secure your organization. Read More

Thumbnail Image
INSIDER

How risk-based authentication has become an essential security tool

A new generation of risk-based authentication (RBA) products can improve both customer experience and security. Here's what to look for in them. Read More

Thumbnail Image
INSIDER

Honeypots as deception solutions: What to look for and how to buy

Commercial and open source honeypot tools are now effective deception solutions. Here's what you need to know before implement them. Read More

White Paper: PTC

4 Reasons Remote Monitoring is Your Best Move to Better Service

Download this free e-book to discover how companies are realizing proven returns with IoT-enabled remote monitoring, which can be quickly implemented and monetized. Read More

CSO Insider

1. 8 hot cyber security trends (and 4 going cold)
2. 11 tips to prevent phishing
3. Sample computer and e-mail usage policy
4. State of Cybercrime: Security events decline, but not the impact
5. 6 use cases for blockchain in security

Editor's Picks

1. What’s new in Windows 10 security features: The privacy edition
2. 11 ways to hack 2FA
3. 7 highest-paying IT security jobs, 2018
4. A quick tour of the Dark Web
5. What an Apple phishing attack looks like
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.