Traveling to China for work? Punch through the Great Firewall and securely connect with your home office

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Aug 23, 2018
Featured Image
INSIDER

Review: Using AI to outsmart threats with Vectra Cognito

Part traffic monitoring tool, part IDS, part SIEM, the Vectra Cognito platform defies classification. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Traveling to China for work? Punch through the Great Firewall and securely connect with your home office
What is WebAuthN? Possibly the answer to all web authentication
Reevaluate "low-risk" PHP unserialization vulnerabilities, researcher says
Arista Networks PICs its spot In security
Why SMS banking is still a bad idea
What are small organizations doing about cybersecurity?

White Paper: Hitachi ID Systems, Inc.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More

Thumbnail Image

Traveling to China for work? Punch through the Great Firewall and securely connect with your home office

Anti-censorship proxy Psiphon to partner with secure messaging app Wickr. Read More

Thumbnail Image
INSIDER

What is WebAuthN? Possibly the answer to all web authentication

With strong support from Google, Microsoft and other vendors, WebAuthN is poised to become a true standard for passwordless authentication over the web. Read More

Thumbnail Image

Reevaluate "low-risk" PHP unserialization vulnerabilities, researcher says

Over nearly a decade, PHP unserialization vulnerabilities have become a popular route for cyber-criminals to plant remote code execution or deliver other malware into systems. But new research, introduced at Black Hat this month, shows that malevolent hackers can introduce this vulnerability, even in environments that were previously considered low-risk for this attack. Read More

Thumbnail Image

Arista Networks PICs its spot In security

After establishing itself as an innovative network vendor, Arista has moved into the security market, addressing the challenges of 'places in cloud.' Read More

Thumbnail Image
INSIDER

Why SMS banking is still a bad idea

Bank customers like the convenience of accessing data via text message, but security experts have concerns about financial textbots. Read More

Thumbnail Image

What are small organizations doing about cybersecurity?

Firms with 50 to 499 employees are spending more money, purchasing security product suites, and outsourcing security tasks to MSSPs. Read More

White Paper: Bronze Drum Consulting

How Powerful New Technologies are Powering a Real-Time Revolution in Capital Markets

Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More

Editor’s Picks

1. 3 reasons companies fail to assess the scope of a data breach
2. The 10 Windows group policy settings you need to get right
3. How to perform a risk assessment: Rethinking the process
4. Preparing for the day quantum computing cracks public-key cryptography: What to do now
5. 8 hot cyber security trends (and 4 going cold)
6. Top cyber security certifications: Who they're for, what they cost, and which you need
7. 24 best free security tools
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.