2015년 2월 17일 화요일

Apple's Tim Cook warns that sacrificing privacy 'risks our way of life'


ITworld Security Strategies
Google Plus LinkedIn Facebook Twitter


INSIDER
Beware of hot foreign spies who want to steal your data 
  The hottest new attack tool for stealing sensitive information? Sexy foreign spies. Learn the tools and methods used to bait and hook high-value employees and bleed your organization dry of data. Read More 


: Citrix Systems

Security Leadership Series: Security Strategies for Success 
Today’s highly mobile employees and line-of-business groups are front-line participants in the struggle to secure the enterprise. This exclusive CSO Magazine eBook shares best practices for leading meaningful security discussions, engaging users to protect business information, and meeting security-related compliance requirements. Learn more

WHITE PAPER: Citrix Systems

10 Essential Elements for a Secure Enterprise Mobility 
This white paper highlights 10 key points encompassing security, user experience, IT operations and BYOD to help your organization realize the full benefits of mobility. Learn more
Apple's Tim Cook warns that sacrificing privacy 'risks our way of life' 
Apple's chief believes the personal impact of security breaches can be devastating Read More 

How a bug almost ate all of your Facebook photos 
Researcher reports he can delete photos from anybody’s account, Facebook patches flaw, he collects $12,500 bounty.Read More 

VirusTotal tackles false positive malware detections plaguing antivirus and software vendors 
VirusTotal is gathering file metadata from trusted software makers to integrate in its online scanning engine Read More 

Box gets customer-managed key encryption 
Fresh off its initial public offering, cloud file synch share and storage company Box has a new Enterprise Key Management (EKM) offering out this week that analysts say could ease customer concerns with using a cloud-based service.Box’s EKM uses Amazon Web Services’ Hardware Security Module (HSM), a device that sits on customers premises to hold keys to encrypted data. Previously, customers relied on Box to encrypt their data and Box held the keys; now, customers get to hold the keys on their own premises.“Yes this is significant news,” says Adrian Sanabria, a security analyst at 451 Research Group. “I’d say that client-side encryption has been a major obstacle to increased cloud/EFSS (Enterprise File Synch and Share) adoption.”To read this article in full or to leave a comment, please click here Read More 


WHITE PAPER: DomainTools

Beyond Whois: The Power of Domain Profiles in Cybersecurity 
A basic Whois query takes a few seconds but can provide the foundation for an investigation. However, it's often the data that does NOT reside in a Whois record that can be truly illuminating. Like a CarFax report going beyond the vehicle title, there is a wealth of knowledge in other public data. Learn more >>
Proposal for altered data retention law is still unlawful, Dutch DPA says 
Obliging telecom companies to retain customer data for months to help the police catch criminals is disproportionate, the DPA said Read More 

Information disclosure flaw exposes Netgear wireless routers to attacks 
The vulnerability allows attackers to extract admin passwords and wireless network keys Read More 

Cybercriminal gang plunders up to $1 billion from banks over two years 
Once inside a bank's network, the gang studied how it performed wire transfers in order to better mask fraud Read More 

Obama pushes for more cyberthreat information sharing 
The president signs an executive order intended to encourage companies to share more information with each other Read More 
 
 
FOR INSIDERS ONLY
Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

Review: The big 4 Java IDEs compared

15 ways to screw up a job interview

12 tips to tune your Wi-Fi network

Container wars: Interesting times ahead for Docker and its competitors

6 things every IT person should know

IT Resume Makeover: How (and when) to break the rules

댓글 없음:

댓글 쓰기