Wednesday, March 14, 2018

Severe flaws could turn your smart camera into someone else's surveillance tool

What is security's role in digital transformation?

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Mar 14, 2018
Featured Image

Severe flaws could turn your smart camera into someone else's surveillance tool

Researchers from Kaspersky Lab ICS CERT found 13 severe security flaws that could turn a popular smart camera into a device an attacker could use to spy on you. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What is security's role in digital transformation?
Get a 299-Piece All-Purpose First Aid Kit For $12 Today
Avoiding security event information overload
Who owns identity and access management?
Security vs. visibility: Why TLS 1.3 has data center admins worried
5 biggest healthcare security threats for 2018

White Paper: Bitsight

40 Questions You Have in Your Vendor Security Assessment

Our goal with this guide is to help you get started with the creation of your vendor security risk assessment. This is not intended to be an out-of-box security assessment solution, but rather, a guide to get you headed in the right direction. We'll explain the top three frameworks you should be examining, questions you may want to consider (and why you should potentially consider them) and what else to include in your VRM program. Read More

Thumbnail Image

What is security's role in digital transformation?

Digital transformation is front of mind for many senior executives, but too often security is left behind. Read More

Thumbnail Image
DealPost

Get a 299-Piece All-Purpose First Aid Kit For $12 Today

The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More

Thumbnail Image

Avoiding security event information overload

Choose a security event information management (SEIM) vendor that helps you focus on only the security event data that needs to be investigated. Read More

Thumbnail Image

Who owns identity and access management?

Learn the best practices for integrating identity management into your business while also staying ahead of cutting edge competition. Read More

Thumbnail Image
INSIDER

Security vs. visibility: Why TLS 1.3 has data center admins worried

A number of data center administrators from large financial, health care and retail corporations have begun to regard the current draft of the 1.3 version of the TLS protocol with increasing alarm. The issue comes down the tussle between security and visibility. Read More

Thumbnail Image
INSIDER

5 biggest healthcare security threats for 2018

Healthcare continues to be a popular target for ransomware, cryptomining, data theft, phishing, and insider threats. Read More

White Paper: Jamf

Modern Device Management: Mac Alongside Windows

The rise of employee-choice programs, and the resulting growth of Apple in the enterprise, introduces new challenges and unknowns for previously Windows - dominated environments. This report outlines how Mac and Windows devices, tools and infrastructure can be integrated to deliver a more secure and productive environment. Read More

CSO Insider

1. What is personally identifiable information (PII)? How to protect it under GDPR
2. What are the GDPR requirements?
3. Fraud prevention: Improving internal controls
4. Why are organizations worldwide failing at cloud data security?
5. Separation of duties and IT security

Editor's Picks

1. 10 questions to answer before running a capture the flag (CTF) contest
2. Insecure by design: What you need to know about defending critical infrastructure
3. Recent cyber attacks show disturbing trends
4. The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet
5. What is a virtual CISO? When and how to hire one
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:03 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive