Tuesday, July 31, 2018

How dangerous are deepfakes?

California Consumer Privacy Act: What you need to know to be compliant

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Jul 31, 2018
Featured Image

What are deepfakes? How and why they work

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

California Consumer Privacy Act: What you need to know to be compliant
How to conduct a proper GDPR audit: 4 key steps
Keeping pace with security automation
How do you secure the cloud? New data points a way
The chatbot revolution will (not) be secure
Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37

Video/Webcast: TetraVX

Unified Communications in The Cloud: Every Journey is Different

In this webinar, Dean Pipes, Chief Innovation Architect at TetraVX, will walk through how each organization's journey to the cloud is different and provide a complete and holistic view of what it takes to build a proper, and cost efficient, strategy and implementation plan. Read More

Thumbnail Image

California Consumer Privacy Act: What you need to know to be compliant

California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change. Read More

Thumbnail Image
INSIDER

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take. Read More

Thumbnail Image
INSIDER

Keeping pace with security automation

Stressed and stretched, IT security teams look to automation for relief. Read More

Thumbnail Image
INSIDER

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private, and hybrid cloud deployments. Here's advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy. Read More

Thumbnail Image
INSIDER

The chatbot revolution will (not) be secure

Two blockchain projects hope to prevent bot authentication issues before they start. Read More

Thumbnail Image
Video

Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37

Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks. Watch Now

White Paper: Hitachi ID Systems, Inc.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More

Editor's Picks

1. Identity eats security: How identity management is driving security
2. What it takes to build a zero trust network
3. 7 threat modeling mistakes you're probably making
4. 6 essential elements of edge computing security
5. Hardware, software options emerge for runtime encryption
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:04 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive