Tuesday, July 31, 2018

Researchers reveal 20 vulnerabilities in Samsung SmartThings Hub

Google Intends on Making GCP the Most Secure Cloud Platform

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jul 31, 2018
Featured Image

Researchers reveal 20 vulnerabilities in Samsung SmartThings Hub

Samsung released firmware to patch 20 flaws that if exploited, could have let attackers remotely control and even physically damage IoT gadgets connected the SmartThings Hub. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Google Intends on Making GCP the Most Secure Cloud Platform
Refresh your networking skills with this Cisco CCNA training suite
Secret Quiet Skies surveillance program tracks citizens not suspected of wrongdoing
The risks associated with global Internationalized Domain Names | Salted Hash Ep 36
How to conduct a proper GDPR audit: 4 key steps
Can cyber insurance cover acts of cyber terrorism?

Video/Webcast: TetraVX

Unified Communications in The Cloud: Every Journey is Different

In this webinar, Dean Pipes, Chief Innovation Architect at TetraVX, will walk through how each organization's journey to the cloud is different and provide a complete and holistic view of what it takes to build a proper, and cost efficient, strategy and implementation plan. Read More

Thumbnail Image

Google Intends on Making GCP the Most Secure Cloud Platform

After notable presentations and announcements at Google Next, Google must educate the market and turn up the competitive fire Read More

Thumbnail Image
DealPost

Refresh your networking skills with this Cisco CCNA training suite

Over 30 hours of digital content across 399 lectures, which can be viewed on your computer or mobile device. Read More

Thumbnail Image

Secret Quiet Skies surveillance program tracks citizens not suspected of wrongdoing

The TSA has a secret, domestic Quiet Skies surveillance program that includes federal air marshals tracking U.S. travelers not under investigation or suspected of wrongdoing. Read More

Thumbnail Image
Video

The risks associated with global Internationalized Domain Names | Salted Hash Ep 36

Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals -- and how to combat them. Watch Now

Thumbnail Image
INSIDER

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take. Read More

Thumbnail Image
INSIDER

Can cyber insurance cover acts of cyber terrorism?

Cyber insurance policies do not typically cover physical destruction or loss of life, but the UK government-backed reinsurer, Pool Re, announced this year it will cover acts of cyber officially deemed "terrorism" by Her Majesty's Government. (Did you spot the catch?) Read More

White Paper: Hitachi ID Systems, Inc.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More

Editor's Picks

1. Identity eats security: How identity management is driving security
2. What it takes to build a zero trust network
3. 7 threat modeling mistakes you're probably making
4. 6 essential elements of edge computing security
5. Hardware, software options emerge for runtime encryption
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 3:01 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive