Thursday, February 1, 2018

New cryptocurrencies offer better anonymity, new security challenges

Review: BluVector enables machines to protect themselves

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Feb 01, 2018
Featured Image

New cryptocurrencies offer better anonymity, new security challenges

Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Review: BluVector enables machines to protect themselves
4 must-know facts about secure mobile printing
Bridging the smart cities security divide
Enterprise plans for security automation and orchestration
10 old-school security principles that (still) rule

White Paper: AVI-SPL

Collaboration Solutions in a Cloud-Centric World

Cloud is transforming how communications and collaboration capabilities are purchased and consumed. It delivers revolutionary changes in cost savings, risk reduction, business agility, and ease of management. Read More

Thumbnail Image
INSIDER

Review: BluVector enables machines to protect themselves

With machine learning that gets smarter and more network-aware over time, BluVector can tip the scales back in favor of defenders. Read More

Thumbnail Image

4 must-know facts about secure mobile printing

Mobile printing is making major strides right now. Is your company's mobile print security up to speed? Read More

Thumbnail Image

Bridging the smart cities security divide

There are plenty of organizations that seem to be working on answers to secure smart cities, but in many ways it's like the early days of cloud computing with everyone building their own solutions. Read More

Thumbnail Image

Enterprise plans for security automation and orchestration

Organizations want to merge threat intelligence with internal security telemetry, add custom functionality for security operations, and automate remediation tasks. Read More

Thumbnail Image
INSIDER

10 old-school security principles that (still) rule

Oldies but goodies, these security tips have stood the test of time. Read More

White Paper: AVI-SPL

Connecting Collaboration Tech from Multiple Vendors: 5 Experts Share Insights with IT

Many IT and facilities professionals have the technical pieces of their collaboration solution - the room-based video conferencing assets and a UCC solution such as Microsoft Skype for Business or Cisco Spark. What they need now is a way to put the puzzle pieces together. We asked experts from Cisco, Crestron, Biamp, NEC, and AVI-SPL to share their insights and advice for companies trying to create a unified collaborative enterprise. Read More

CSO Insider

1. 10 old-school security priniciples that (still) rule
2. Top security certifications: Who they're for, what they cost, and which you need
3. 5 top machine learning use cases for security
4. 11 top tools to assess, implement, and maintain GDPR compliance
5. How hackers crack passwords and why you can't stop them

Editor's Picks

1. Spectre and Meltdown explained: What they are, how they work, what's at risk
2. Identity management definition, uses and solutions
3. Understanding the CVE and how it can help secure your company's network
4. 8 top cyber attack maps and how to use them
5. The cyber kill chain explained: Why it's not always the right approach to cyber attacks
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:07 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive