Tuesday, March 6, 2018

Facebook survey about pedophiles raises concerns

Sometimes encryption can actually make you less secure

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Mar 06, 2018
Featured Image

Facebook survey about pedophiles raises concerns

A Facebook survey asked users if men should be allowed to ask kids for sexual pictures. It later admitted the survey was 'a mistake.' Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Sometimes encryption can actually make you less secure
Get a 299-Piece All-Purpose First Aid Kit For $12 Today
10 questions to answer before running a capture the flag (CTF) contest
Thinking about identity management for the RSA Security Conference
Is your defensive security data-driven?
SEC's new cybersecurity guidance falls short

White Paper: NetApp

All-Flash Storage Competitive Comparison: NetApp AFF vs. Pure Storage FlashArray//M

Not all flash storage architectures are created equal. Read this vendor comparison report and learn about the differences between solutions from NetApp and Pure and how to find the best all-flash arrays to meet your business needs. Read More

Thumbnail Image

Sometimes encryption can actually make you less secure

In an age where advanced analytics to detect a sophisticated attack is often the only chance of heading off substantial harm, encrypting SMB is akin to taking one step forward and 50 steps back. Read More

Thumbnail Image
DealPost

Get a 299-Piece All-Purpose First Aid Kit For $12 Today

The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More

Thumbnail Image

10 questions to answer before running a capture the flag (CTF) contest

Running your own CTF contest can build security skills and help identify new internal and external talent. Learn what types of challenges you need to include, how to make the contest run smoothly, and other logistics to consider. Read More

Thumbnail Image

Thinking about identity management for the RSA Security Conference

Password elimination, software-defined perimeter, and the need for security to "own" identity should be highlighted at the RSA Conference. Read More

Thumbnail Image

Is your defensive security data-driven?

Data-driven defense uses an organization's own data to identify and mitigate the most important threats. Sounds good, but adoption will be met with resistance. Read More

Thumbnail Image

SEC's new cybersecurity guidance falls short

Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will be disappointed. Read More

eBook: NetApp

Cloud-Integrated Backup: How to Save Money and Increase Efficiency

This easy to read eBook examines the benefits of cloud backup solutions and features examples of companies that are using cloud storage to reduce costs and increase operational efficiency. Read More

CSO Insider

1. GDPR and the "right to explanation"
2. The two most important ways to defend against security threats
3. 11 tips for prioritizing security spending
4. 7 threat modeling mistakes you're probably making
5. Mastering email security with DMARC, SPF and DKIM

Editor's Picks

1. What is cryptojacking? How to prevent, detect, and recover from it
2. How to approach a Zero Trust security model for your enterprise
3. 4 reasons forensics will remain a pillar of cybersecurity
4. What's new in Windows 10 security features: The anti-ransomware edition
5. Facebook's free VPN acts like spyware to iOS users in the U.S.
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:04 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive