How safe are your passwords? Real life rules for businesses to live by

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Aug 31, 2017
Featured Image

Credit card fraud: What you need to know now

Credit and payment card thieves are getting more sophisticated as chipped cards drive them to account takeover and card-not-present schemes. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How safe are your passwords? Real life rules for businesses to live by
Biometrics and blockchains: Why identity matters (part 1)
Will GDPR protect individuals’ privacy or lead to more hacks?
How Bitdefender HVI protects virtual browsers

Video/Webcast: CDW Corporation

Optimizing the Next Generation Data Center

Digital business is different. To compete, organizations must be faster, with the ability to extract value from information - as well as to change direction quickly as conditions change. The trouble is, yesterday's IT infrastructures were not built for the digital economy. Some exciting new technologies are emerging to help, but the reality for most organizations is the need to do more with less. Read More

Thumbnail Image

How safe are your passwords? Real life rules for businesses to live by

While people applaud easier password guidance from NIST, easier is not better. Here’s what you need to consider when creating a company password policy. Read More

Thumbnail Image

Biometrics and blockchains: Why identity matters (part 1)

Your identity matters online because so many services now require proof for access to money, benefits, and medical information. Document-based credentials, like birth certificates, passports, and driver's licenses, will become digital but many problems remain unsolved including how to secure, assign, verify, authenticate and revoke such digital credentials. A dozen efforts are underway that use blockchain technologies to solve these issues and we assume that biometrics will be the fallback method for assigning credentials such that you don't need a token or you forget your password to your birth certificate. In this series of articles, we explore the promise and problems of blockchain and biometrics. Read More

Thumbnail Image

Will GDPR protect individuals’ privacy or lead to more hacks?

Is it coincidence that the GDPR will have the greatest effect on non-EU companies that use data in the ways described above? The answer is no. Read More

Thumbnail Image
INSIDER

How Bitdefender HVI protects virtual browsers

The Bitdefender Hypervisor Introspection (HVI) tool sits below the hypervisor and prevents any of these tactics such as buffer overflows, heap sprays, code injection and API hooking from executing, protecting the virtual browser from ever becoming compromised. Read More

Video/Webcast: NICE Systems

Re-Engineering Performance Management

Hear from Gallup Lead Researcher, Ben Wigert, in this on demand webinar to glean insights from Gallup's research paper, Re-Engineering Performance Management, and how you can put them into action at your organization. Read More

CSO Insider

1. Database security face-off: IBM Guardium vs. Imperva SecureSphere Database Security
2. State of Cybercrime 2017: Security events decline, but not the impact
3. Container security: How Waratek blocks Java exploits
4. Patrolling network traffic with SecBI
5. Lacework unmasks hidden attackers amid data center and cloud chaos

Editor's Picks

1. Malicious code in the Node.js npm registry shakes open source trust model
2. The 10 Windows group policy settings you need to get right
3. Separation of duties and IT security
4. Why SSL/TLS attacks are on the rise
5. IT's 9 biggest security threats
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as [email protected].

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to [email protected].