Always use two-factor authentication (2FA) when it is offered, but don't assume that it is completely secure. Read More ▶ | | | eBook: RiskSense, Inc Download our eBook to learn valuable lessons from cyber risk experts who actively face challenges in threat and vulnerability management. Discover how to foster collaboration between security and IT ops to prioritize remediation, and apply next-generation tools. Read More ▶ | Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 1803 feature release. Read More ▶ | | A professor at Münster University issued a warning on Sunday about serious vulnerabilities in PGP and S/MIME – two widely-used methods for encrypting email – which, if exploited, could reveal plain text communications. The issue also impacts emails from the past. Read More ▶ | | | "There are two extremes right now: no idea where to start or do a bug bounty," says Moussouris, who built Microsoft's vulnerability disclosure program. Read More ▶ | | The Dark Web has an interesting persona, and much of it is fueled by hype. This week on Salted Hash we speak to Alon Arvatz, co-founder at IntSights, who gives us a basic overview of some of the things people do in this somewhat hidden environment. Read More ▶ | | Endpoint security is focused on locking down endpoints — individual computers, phones, tablets and other network-enabled devices — in order to keep networks safe. Of course, as threats evolve, endpoint security suites must evolve as well. Read More ▶ | | From the editors of CSO, Security Smart is a quarterly newsletter ready for distribution in your organization. We combine personal device and home safety tips with organizational security awareness, making security training relevant, timely, engaging and entertaining. Subscribe today! Read More ▶ | | White Paper: Comodo With the decrease in cost of SSL certificates, there has been an increase in the number of phishing websites using SSL certificates. The different levels of SSL certificates (DV, OV, EV) each provide unique visual identifiers and levels of trust. Learn more about the steps that companies can take to ensure their customers are protected, and the methods that are used across the industry. Read More ▶ | CSO Insider | Editor's Picks | | | |
0 comments:
Post a Comment