Open source software security challenges persist

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Apr 03, 2018
Featured Image

Saks, Lord & Taylor hacked; 5 million payment cards compromised

Hackers managed to lurk on the network of Saks Fifth Avenue, Saks Off 5th, and Lord & Taylor for nearly a year and steal the payment card data of 5 million customers. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Open source software security challenges persist
Get a 299-Piece All-Purpose First Aid Kit For $12 Today
Iran's need to steal intellectual property
Don’t rush to deploy 5G if you want IoT security, agency warns
Want to hack a voting machine? Hack the voting machine vendor first
FedRAMP basics: How cloud providers get authorized to work with the U.S. government

White Paper: Digital Shadows

Account Takeover: 7 Ways to Mitigate the Growing Risks of Account Takeover

Billions of leaked credentials are exposed online every year. Cybercriminals are increasingly turning to credential stuffing tools to automate attempts at account takeover, making these leaked credentials very useful for them. Read More

Thumbnail Image

Open source software security challenges persist

Using open source components saves developers time and companies money. In other words, it's here to stay. Here's a look at what it will take to improve open source security. Read More

Thumbnail Image
DealPost

Get a 299-Piece All-Purpose First Aid Kit For $12 Today

The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More

Thumbnail Image

Iran's need to steal intellectual property

The indictment of nine Iranians by the DOJ is one in a long string of incursions by Iran to compromise trusted insiders and steal intellectual property. Read More

Thumbnail Image

Don’t rush to deploy 5G if you want IoT security, agency warns

Flaws in 2G, 3G and 4G networks could be repeated in 5G, says EU IT security agency. Read More

Thumbnail Image

Want to hack a voting machine? Hack the voting machine vendor first

How password reuse and third-party breaches leave voting machine vendors vulnerable to attack. Read More

Thumbnail Image

FedRAMP basics: How cloud providers get authorized to work with the U.S. government

The process for getting the FedRAMP seal of approval is complex, but it can ultimately be lucrative for companies that meet the security requirements. Read More

White Paper: F5 Networks

Automating NetOps: Closing the IT Skills Gap

Today that skills gap is around automation, orchestration, and DevOps methodologies-as well as how to apply them to cloud environments. Nearly three in four (74%) of respondents to the F5 State of Application Delivery 2018 survey rate the use of automation in the operation of IT infrastructure to be "somewhat" or "very" important. That holds true across all roles in the organization-including C-level executives and security professionals. Read More

CSO Insider

1. 14 top tools to assess, implement, and maintain GDPR compliance
2. What are the GDPR requirements?
3. Third-party security vetting: Do it before you sign a contract
4. Separation of duties and IT security
5. Review: Bricata adds threat hunting to traditional IPS/IDS

Editor's Picks

1. Rogues' gallery: 7 insiders who breached security
2. Why you don't need an RFID-blocking wallet
3. The 6 best password managers
4. 8 hot cyber security trends (and 4 going cold)
5. The 10 Windows group policy settings you need to get right
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as [email protected].

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to [email protected].