What are blockchain’s smart contracts? And how to secure them

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Oct 16, 2018
Featured Image

The fix for IT supply chain attacks

Bloomberg's China spy chip story underscores weaknesses in computer supply chain security. The solution needs to be global. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What are blockchain’s smart contracts? And how to secure them
Improving cybersecurity culture requires clarity, commitment
How to secure serverless apps and how they are hacked
5 steps to create a zero trust security model
Cybercriminals are using blockchain to improve security. Should you?
Hacking smart buildings
Thumbnail Image
INSIDER

What are blockchain’s smart contracts? And how to secure them

Smart contracts are moving into the enterprise, but they aren’t bulletproof. These are the vulnerabilities and best practices for securing them. Read More

Thumbnail Image

Improving cybersecurity culture requires clarity, commitment

Only a third of employees have a sound understanding of their role in their organizations’ security culture. Read More

Thumbnail Image
INSIDER

How to secure serverless apps and how they are hacked

Attackers have several ways to hack serverless applications, but these best practices will help keep them out. Read More

Thumbnail Image
INSIDER

5 steps to create a zero trust security model

A clear plan and willingness to change are critical to successfully moving to a zero trust environment. Read More

Thumbnail Image
INSIDER

Cybercriminals are using blockchain to improve security. Should you?

Business-minded hackers are testing blockchain technologies to secure their illegal operations. Here's what enterprises can learn from them. Read More

Thumbnail Image
INSIDER

Hacking smart buildings

Smart buildings are giant IoT devices begging to get hacked. A new report offers concrete advice on how to mitigate the risk to building automation and control systems (BACS). Read More

Editor’s Picks

1. 10 essential enterprise security tools (and 11 nice-to-haves)
2. 5 hard truths every CISO should know
3. The Options Clearing Corporation taps AI to stay ahead of hackers
4. What is security’s role in digital transformation?
5. What is an RDP attack? 7 tips for mitigating your exposure
6. Are long passphrases the answer to password problems?
7. 5 cyber security basics you can't afford to ignore

Get Security Smart

Forty-four percent of respondents to the 2017 Global State of Information Security Survey cited employee awareness and cooperation as their top security challenge. We can help. From the editors of CSO, Security Smart is a quarterly security awareness newsletter ready for distribution in your organization. Subscribe now and arm your employees with the information they need to be more secure at home and at work. Learn more.
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.