Sunday, January 7, 2018

Hacking bitcoin and blockchain

Spectre and Meltdown: What you need to know going forward

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Jan 07, 2018
Featured Image

Hacking bitcoin and blockchain

Both bitcoin and blockchain are vulnerable to attack. Here's what you need to know to protect yourself and why blockchain is becoming a foundational technology. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Spectre and Meltdown: What you need to know going forward
The dirty dozen: 12 top cloud security threats for 2018
Keeping pace with security automation
Password managers grow up, target business users
Anonymous no more: Reusing complex passwords gives your identity away
Best Android antivirus? The top 10 tools

Video/Webcast: Citrix Systems Inc

Contextual access to apps and data anywhere, any time, on any device

Business desktops and applications, delivered as a service, are available to users anywhere, anytime, on any device. But what about the security aspects? There may be some instances where users, shouldn't have access to sensitive applications and data. That's where Citrix provides the power of contextual access which allows IT to set policies for who can access data based on location, device and network. Watch this video and we'll show you how. Read More

Thumbnail Image

Spectre and Meltdown: What you need to know going forward

As you've likely heard by now, there are some problems with Intel, AMD, and ARM processors. Called Meltdown and Spectre, the discovered attack possibilities are rather severe, as they impact pretty much every technical device on the network or in your house (PCs, laptops, tablets, phones, etc.). Here's a breakdown of all the things you need to know. Read More

Thumbnail Image

The dirty dozen: 12 top cloud security threats for 2018

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services. Read More

Thumbnail Image
INSIDER

Keeping pace with security automation

Stressed and stretched, IT security teams look to automation for relief. Read More

Thumbnail Image

Password managers grow up, target business users

Enterprise-class password managers fill key security gaps left by single sign-on (SSO) and cloud access solutions. Read More

Thumbnail Image

Anonymous no more: Reusing complex passwords gives your identity away

Researchers deanonymized anonymous Tor Mail accounts, raising awareness of the implications of reusing even complex passwords when creating an anonymous account. Read More

Thumbnail Image

Best Android antivirus? The top 10 tools

There are plenty of antivirus tools for Android. Here's how the top 10 measure up in protection, usability and features. Read More

White Paper: sqrrl

Huntpedia: Your Threat Hunting Knowledge Compendium

Check out the popular "Huntpedia" eBook featuring all your favorite Threat Hunting people. Sqrrl has partnered with over a dozen of the leading experts on Threat Hunting and Incident Response to share their own tactics, techniques and procedures for finding evil on the wire. Read More

CSO Insider

1. 5 top machine learning use cases for security
2. Security platform or best of breed? There's only one answer
3. Is source code inspection a security risk? Maybe not, experts say
4. Crossbow offers live fire cybersecurity vulnerability testing
5. Data breached in translation

Editor's Picks

1. Spectre and Meltdown: What you need to know going forward
2. Password managers grow up, target business users
3. How 3 innovative products approach network security
4. 17 steps to being completely anonymous online
5. The dirty dozen: 12 top cloud security threats for 2018
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:04 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive