Password managers grow up, target business users

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jan 05, 2018
Featured Image

Spectre and Meltdown: What you need to know going forward

As you've likely heard by now, there are some problems with Intel, AMD, and ARM processors. Called Meltdown and Spectre, the discovered attack possibilities are rather severe, as they impact pretty much every technical device on the network or in your house (PCs, laptops, tablets, phones, etc.). Here's a breakdown of all the things you need to know. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Password managers grow up, target business users
41% off CyberPower Surge Protector 3-AC Outlet with 2 USB (2.1A) Charging Ports - Deal Alert
China and Germany in a dust up over cybersecurity
GPS tracking vulnerabilities leave millions of products at risk
Review: Digital Guardian offers ready-to-deploy endpoint security
Anonymous no more: Reusing complex passwords gives your identity away

White Paper: PTC

Improving Efficiency Across the Value Chain with Digital Product Visualization

Design review and demonstration have become increasingly important for product development and sales. However, there are several obstacles that can prevent a company from fully realizing their product's potential. Learn more here. Read More

Thumbnail Image

Password managers grow up, target business users

Enterprise-class password managers fill key security gaps left by single sign-on (SSO) and cloud access solutions. Read More

Thumbnail Image
DealPost

41% off CyberPower Surge Protector 3-AC Outlet with 2 USB (2.1A) Charging Ports - Deal Alert

This compact surge protector provides 600 joules of protection, 3 outlets, and a folding wall tap plug. Two USB ports (2.1 Amp) charge personal electronics, including smartphones, digital cameras, MP3 players, and other devices. Read More

Thumbnail Image

China and Germany in a dust up over cybersecurity

Germany calls out China on their lack of progress on bilateral cybersecurity efforts, while China continues to target German companies for intellectual property theft. Read More

Thumbnail Image

GPS tracking vulnerabilities leave millions of products at risk

It's an IoT nightmare. One that is entirely preventable. Two researchers have disclosed problems with hundreds of vulnerable GPS services using open APIs and trivial passwords (123456), resulting in a multitude of privacy issues including direct tracking. Further, many of the vulnerable services have open directories exposing logged data. Read More

Thumbnail Image
INSIDER

Review: Digital Guardian offers ready-to-deploy endpoint security

Advanced threats are increasingly assaulting endpoints. Here's how the Digital Guardian Threat Aware Data Protection Platform tackles the problem. Read More

Thumbnail Image

Anonymous no more: Reusing complex passwords gives your identity away

Researchers deanonymized anonymous Tor Mail accounts, raising awareness of the implications of reusing even complex passwords when creating an anonymous account. Read More

Video/Webcast: Workday Inc.

The Strategic CIO: How IT Leaders Are Breaking Out of Their Functional Role to Drive Business Innovation

CIOs have made significant strides in shifting from a keep-the-lights-on mentality to a more strategic approach that fuels business growth. But there's more work to be done. In this webcast, IDG's Adam Dennison and Workday's Diana McKenzie will discuss the trends that are driving transformation of the CIO role and the steps today's CIOs can take to accelerate their impact and influence across the business. Read More

CSO Insider

1. 6 missteps that could cost CISOs their jobs
2. How hackers crack passwords and why you can't stop them
3. 11 top tools to assess, implement, and maintain GDPR compliance
4. 5 reasons to take a fresh look at your security policy
5. Six entry-level cybersecurity job seeker failings

Editor's Picks

1. Security platform or best of breed? There’s only one answer
2. The truth about RFID credit card fraud
3. Best security software, 2017: How cutting-edge products fare against the latest threats
4. 5 mobile security threats you should take seriously in 2018
5. Hacking bitcoin and blockchain
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2018 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.