Monday, May 21, 2018

How risk-based authentication has become an essential security tool

Tech Talk: Prepping for GDPR

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

May 21, 2018
Featured Image
INSIDER

How risk-based authentication has become an essential security tool

A new generation of risk-based authentication (RBA) products can improve both customer experience and security. Here's what to look for in them. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Tech Talk: Prepping for GDPR
$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert
Honeypots as deception solutions: What to look for and how to buy
The AI hype machine – let's be careful out there
Preventing ransomware attacks the right way
Security Smart, Winter 2018

White Paper: CBTS

Estimated $12 billion spent on infrastructure - ZK Research

IT and business leaders today are focused on creating a more agile business! Evolving the WAN must be at the top of every IT and business leader's priority list because organizations can only be as agile as their least agile IT component - which, today, is the WAN. Read More

Thumbnail Image
Video

Tech Talk: Prepping for GDPR

CSO's Michael Nadeau and Steve Ragan join Computerworld's Ken Mingis and IDG Communications' Mark Lewis to look at what the new EU privacy rules means. They offer insights on how companies can prepare – and what happens if they don't. Watch Now

Thumbnail Image
DealPost

$29 For Two Etekcity Smart Plugs With Alexa Compatibility - Deal Alert

Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren't in use. Read More

Thumbnail Image
INSIDER

Honeypots as deception solutions: What to look for and how to buy

Commercial and open source honeypot tools are now effective deception solutions. Here's what you need to know before implement them. Read More

Thumbnail Image

The AI hype machine – let's be careful out there

AI over-marketing by security vendors is poised to confuse, frustrate and ultimately disillusion potential customers. We're at a challenging point in the early maturity of the AI market: now is the time to set proper expectations so that both security vendors and customers be successful. Read More

Thumbnail Image

Preventing ransomware attacks the right way

Ransomware attacks continue to be a major threat with no sign of slowing down. Here are some lessons organizations can learn from federal agencies to better prevent them. Read More

Thumbnail Image
INSIDER

Security Smart, Winter 2018

From the editors of CSO, Security Smart is a quarterly newsletter ready for distribution in your organization. We combine personal device and home safety tips with organizational security awareness, making security training relevant, timely, engaging and entertaining. Subscribe today! Read More

Video/Webcast: Microsoft | Box

How Digital Transformation Unlocks Innovation and Business Value

Businesses are looking to digital transformation to move faster, increase agility and get things done at the pace today's workforce demands. In this webcast, you'll learn about how and what technologies are supporting the goal of digital transformation and changing how we work and collaborate. Read More

CSO Insider

1. 8 hot cyber security trends (and 4 going cold)
2. 11 tips to prevent phishing
3. Sample computer and e-mail usage policy
4. State of Cybercrime: Security events decline, but not the impact
5. 6 use cases for blockchain in security

Editor's Picks

1. What's new in Windows 10 security features: The privacy edition
2. 11 ways to hack 2FA
3. 7 highest-paying IT security jobs, 2018
4. A quick tour of the Dark Web
5. What an Apple phishing attack looks like
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive