Tuesday, February 27, 2018

2,844 new data breaches added to Have I Been Pwned

Is your vendor being honest about AI?

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Feb 27, 2018
Featured Image

2,844 new data breaches added to Have I Been Pwned

The massive breach, which includes more than 80 million records, is listed as a single 'unverified' data breach, but it is ranked as the 15th biggest breach on Have I Been Pwned. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Is your vendor being honest about AI?
Get a 299-Piece All-Purpose First Aid Kit For $12 Today
GDPR's looming deadlines, massive penalties | Salted Hash, Ep 20
When employee access exceeds trust, IP goes missing
5 top machine learning use cases for security
Review: BluVector enables machines to protect themselves

Video/Webcast: OpenText

HIMSS18 - What's Your Digital Maturity Path for Patient Information Exchange?

Join Amy Perry, Director of Product Marketing at OpenText to explore how healthcare organizations can transition from inefficient paper-based fax to digital. Learn about how solutions like RightFax can simplify, extend, and accelerate your path to digital maturity during this webinar - and to secure your spot with an OpenText expert at HIMSS 2018 by booking a one-on-one meeting today. Read More

Thumbnail Image

Is your vendor being honest about AI?

Some vendors who claim their products use artificial intelligence or machine learning technology are really using rules-based engines. Here's how to spot the lie. Read More

Thumbnail Image
DealPost

Get a 299-Piece All-Purpose First Aid Kit For $12 Today

The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More

Thumbnail Image

GDPR's looming deadlines, massive penalties | Salted Hash, Ep 20

The May 25 deadline for the General Data Protection Regulation (GDPR) is quickly approaching. Organizations large and small are scrambling to align with these new requirements, but the task isn't an easy one. In fact, the idea of moving information control away from the companies that collect it and into the hands of the consumer is a major change for some organizations. Read More

Thumbnail Image

When employee access exceeds trust, IP goes missing

Companies may be tempting fate by giving interns deep access to company data, as these two examples of intellectual property theft show. Read More

Thumbnail Image
INSIDER

5 top machine learning use cases for security

Machine learning will make sense of the security threats your organization faces and help your staff focus on more valuable, strategic tasks. It could also be the answer to the next WannaCry. Read More

Thumbnail Image
INSIDER

Review: BluVector enables machines to protect themselves

With machine learning that gets smarter and more network-aware over time, BluVector can tip the scales back in favor of defenders. Read More

Video/Webcast: Citrix & AWS

NetScaler is "ADC Magic" for Your AWS Deployments

Citrix NetScaler in Amazon Web Services (AWS) environments brings together the flexibility and scalability of the AWS cloud computing platform helping ease the journey to cloud. Consistent, highly-available application delivery across all types of networks, on-premises and on-cloud, keeps your customers, and your business, protected. Join this webinar Thursday March 15th to learn how Citrix NetScaler in AWS Marketplace can help you. Read More

CSO Insider

1. GDPR and the "right to explanation"
2. The two most important ways to defend against security threats
3. 11 tips for prioritizing security spending
4. 7 threat modeling mistakes you're probably making
5. Mastering email security with DMARC, SPF and DKIM

Editor's Picks

1. What is cryptojacking? How to prevent, detect, and recover from it
2. How to approach a Zero Trust security model for your enterprise
3. 4 reasons forensics will remain a pillar of cybersecurity
4. What's new in Windows 10 security features: The anti-ransomware edition
5. Facebook's free VPN acts like spyware to iOS users in the U.S.
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:03 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive