Monday, May 14, 2018

Researchers warn PGP and S/MIME users of serious vulnerabilities

Katie Moussouris: It's dangerous to conflate bug bounties and vulnerability disclosure

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

May 14, 2018
Featured Image

Researchers warn PGP and S/MIME users of serious vulnerabilities

A professor at Münster University issued a warning on Sunday about serious vulnerabilities in PGP and S/MIME – two widely-used methods for encrypting email – which, if exploited, could reveal plain text communications. The issue also impacts emails from the past. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Katie Moussouris: It's dangerous to conflate bug bounties and vulnerability disclosure
Get a 299-Piece All-Purpose First Aid Kit For $12 Today
The rise of the NIST cybersecurity framework
5 top trends in endpoint security for 2018
Ring modernizes the neighborhood watch with its Neighbors app
2018 – the year of the targeted attack?

White Paper: Microsoft Corporation

A Cloud Content Management Platform for Developers

Modern software applications need so much more than just simple storage in the cloud. With Box Platform, you can build rich content experiences in your web, desktop, and mobile apps, with all the features you need - file uploads file viewing, comments, keyword search, file and folder metadata and much more - all backed by the industry's leading security and compliance profile. Read More

Thumbnail Image
INSIDER

Katie Moussouris: It's dangerous to conflate bug bounties and vulnerability disclosure

"There are two extremes right now: no idea where to start or do a bug bounty," says Moussouris, who built Microsoft's vulnerability disclosure program. Read More

Thumbnail Image
DealPost

Get a 299-Piece All-Purpose First Aid Kit For $12 Today

The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More

Thumbnail Image

The rise of the NIST cybersecurity framework

NIST's recently released Cybersecurity Framework version 1.1 showcases the Institute's expanding role and the reliance of lawmakers on its guidance. While this should be welcomed given NIST's rigorous technical approach, eventually the courts or legislators themselves will need to establish a legal standard that sets out what legally constitutes reasonable cybersecurity protections. Read More

Thumbnail Image

5 top trends in endpoint security for 2018

Endpoint security is focused on locking down endpoints — individual computers, phones, tablets and other network-enabled devices — in order to keep networks safe. Of course, as threats evolve, endpoint security suites must evolve as well. Read More

Thumbnail Image

Ring modernizes the neighborhood watch with its Neighbors app

Residents can use Ring's Neighbors app to report 'suspicious' people and activities, while police departments can use it to share real-time crime alerts with communities. Read More

Thumbnail Image

2018 – the year of the targeted attack?

There is a definite increase in sophisticated bad actor groups focusing on specific, high value targets. Read More

Video/Webcast: NICE Systems, Inc.

Automation for Dummies Guide

So you heard about Robotic Automation but you're not sure how to start or how it can help you? As the authors of the "Robotic Process Automation for Dummies", we have all the information you need to get you up to scratch with the industry's hottest trend, RPA. Read More

CSO Insider

1. Evaluating patch management software: 6 key considerations
2. Review: Protecting clouds with Cloud Defender from Alert Logic
3. How safe are your passwords? Real life rules for businesses to live by
4. Credit card fraud: What you need to know now
5. What's new in ransomware?

Editor's Picks

1. Online voting is impossible to secure. So why are some governments using it?
2. Why securing containers and microservices is a challenge
3. RSA roundup: 5 security vendors CISOs need to be aware of
4. Data and privacy breach notification plans: What you need to know
5. How lean development improved software security at Fannie Mae
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:04 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive