6 use cases for blockchain in security

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Feb 07, 2018
Featured Image

The two most important ways to defend against security threats

Patching and security training programs will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

6 use cases for blockchain in security
Get 3 Years of NordVPN Service for Just $2.75 Per Month
Cybersecurity PTSD affects many security professionals
Identity and the smart city
10 old-school security principles that (still) rule
New cryptocurrencies offer better anonymity, new security challenges

Video/Webcast: NICE Systems, Inc.

Quality Management Powered by Omnichannel Analytics: Better Together

In this webinar we will look at the benefits of operationalizing customer and agent analytics with a worthwhile quality program in order to get the most of your analytics. Read More

Thumbnail Image
INSIDER

6 use cases for blockchain in security

Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection. Read More

Thumbnail Image
DealPost

Get 3 Years of NordVPN Service for Just $2.75 Per Month

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.75 per month for 3 years, if you sign up right now. Read More

Thumbnail Image

Cybersecurity PTSD affects many security professionals

Infosec professionals face occupational hazards such as long hours, high stress levels, and career frustration that can lead to mental health issues. Read More

Thumbnail Image

Identity and the smart city

IAMs next big outing. Read More

Thumbnail Image
INSIDER

10 old-school security principles that (still) rule

Oldies but goodies, these security tips have stood the test of time. Read More

Thumbnail Image
INSIDER

New cryptocurrencies offer better anonymity, new security challenges

Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable. Read More

White Paper: 8x8

5 Contact Center Challenges - And How to Solve Them

In the past, companies have had security & privacy concerns about moving a customer-centric service, such as a contact center, to a cloud environment. The cloud-based contact center market size is expected to grow from $5.4 billion in 2016 to $15.7 billion by 2021, according to MarketsandMarkets. Why? Migrating your contact center to a cloud-based solution can turn the challenges you face into opportunities to move your business forward. Read More

CSO Insider

1. 10 old-school security priniciples that (still) rule
2. Top security certifications: Who they're for, what they cost, and which you need
3. 5 top machine learning use cases for security
4. 11 top tools to assess, implement, and maintain GDPR compliance
5. How hackers crack passwords and why you can't stop them

Editor's Picks

1. Spectre and Meltdown explained: What they are, how they work, what's at risk
2. Identity management definition, uses and solutions
3. Understanding the CVE and how it can help secure your company’s network
4. 8 top cyber attack maps and how to use them
5. The cyber kill chain explained: Why it's not always the right approach to cyber attacks
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.