Why aren't we using SHA-3?

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Feb 22, 2018
Featured Image

The global cyber war is heating up: Why businesses should be worried

From NotPetya's global disruption to North Korea's digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here's how to defend against them. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Why aren't we using SHA-3?
How to protect your network from PowerShell exploits
The two most important ways to defend against security threats
Mastering email security with DMARC, SPF and DKIM
How Contrast Security protects applications from the inside out

Trial Download: SelectHub

Top BI Software Reviews & Pricing 2017- Free Analyst Report

This interactive analyst report gives you comparison ratings, reviews and pricing from actual software selection projects. Get everything you need to make the right decision here! Read More

Thumbnail Image

Why aren't we using SHA-3?

The Secure Hash Algorithm version 3 fixes flaws in the now-standard SHA-2 cipher. Here's how to prepare for a migration to SHA-3 when SHA-2 is inevitably compromised. Read More

Thumbnail Image
INSIDER

How to protect your network from PowerShell exploits

PowerShell is a powerful and versatile tool for both Windows sysadmins and hackers, who use it to build malicious scripts that avoid detection. This advice will make it harder for them to do so. Read More

Thumbnail Image
INSIDER

The two most important ways to defend against security threats

Patching and security training programs will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better. Read More

Thumbnail Image
INSIDER

Mastering email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That's easier said than done, but these tips can help. Read More

Thumbnail Image
INSIDER

How Contrast Security protects applications from the inside out

Contrast Security has one of the most elegant solutions out there for application security. We can see why it scored 100 percent on the OWASP Security Benchmark. Read More

White Paper: SlashNext

10 Ways Hackers Evade the Sandbox

NSS labs recently published an evaluation of seven breach detection systems from FireEye, Cisco Check Point, Fortinet, LastLine and TrendMicro. Not surprisingly, the report shows that five out of the seven products tested missed evasions. Read More

CSO Insider

1. GDPR and the "right to explanation"
2. The two most important ways to defend against security threats
3. 11 tips for prioritizing security spending
4. 7 threat modeling mistakes you're probably making
5. Mastering email security with DMARC, SPF and DKIM

Editor's Picks

1. What is cryptojacking? How to prevent, detect, and recover from it
2. How to approach a Zero Trust security model for your enterprise
3. 4 reasons forensics will remain a pillar of cybersecurity
4. What's new in Windows 10 security features: The anti-ransomware edition
5. Facebook's free VPN acts like spyware to iOS users in the U.S.
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.