Using social media for authentication: 3 pitfalls to avoid

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Oct 07, 2018

Ten takeaways from the Splunk user conference

Company continues to expand its cybersecurity footprint, work with industry partners, and commit to customer success. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Using social media for authentication: 3 pitfalls to avoid
Are long passphrases the answer to password problems?
5 hard truths every CISO should know
3 IAM deployment models: Which will work for your organization?
How to secure serverless apps and how they are hacked
Next-generation endpoint security tools ready to replace antivirus
Thumbnail Image
INSIDER

Using social media for authentication: 3 pitfalls to avoid

Logging into business systems with social accounts comes with certain risks. Here's what you need to know. Read More

Thumbnail Image
INSIDER

Are long passphrases the answer to password problems?

Passphrases can be more secure than passwords, but there are limitations and hackers will eventually master cracking them. Read More

Thumbnail Image
INSIDER

5 hard truths every CISO should know

Security professionals ignore these truths at their own peril. The common theme across all five: Don't underestimate the risk of social engineering and poor patching policies. Read More

Thumbnail Image
INSIDER

3 IAM deployment models: Which will work for your organization?

Each of the identity and access management platform deployment models--on-premises, cloud and hybrid--has trade-offs and different resource requirements. Read More

Thumbnail Image
INSIDER

How to secure serverless apps and how they are hacked

Attackers have several ways to hack serverless applications, but these best practices will help keep them out. Read More

Thumbnail Image
INSIDER

Next-generation endpoint security tools ready to replace antivirus

The market for next-generation endpoint security tools has doubled each of the last two years, and will continue to grow at a compound annual growth rate of 67 percent for the next five years -- but that growth could skyrocket if more vendors are certified as antivirus replacements. Read More

Editor’s Picks

1. 10 essential PowerShell security scripts
2. 15 tricks to hold off the hackers
3. 5 open source security tools too good to ignore
4. Kenna Security takes a data-driven approach to risk analysis
5. Cloud functions present new security challenges
6. The 5 best malware metrics you can generate
7. 11 tips for prioritizing security spending
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as [email protected].

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to [email protected].