| ITworld Security Strategies | ||||||||||
The hottest new attack tool for stealing sensitive information? Sexy foreign spies. Learn the tools and methods used to bait and hook high-value employees and bleed your organization dry of data. Read More : Citrix Systems Security Leadership Series: Security Strategies for Success Today’s highly mobile employees and line-of-business groups are front-line participants in the struggle to secure the enterprise. This exclusive CSO Magazine eBook shares best practices for leading meaningful security discussions, engaging users to protect business information, and meeting security-related compliance requirements. Learn more
In this Issue
WHITE PAPER: Citrix Systems 10 Essential Elements for a Secure Enterprise Mobility This white paper highlights 10 key points encompassing security, user experience, IT operations and BYOD to help your organization realize the full benefits of mobility. Learn more Apple's Tim Cook warns that sacrificing privacy 'risks our way of life' Apple's chief believes the personal impact of security breaches can be devastating Read More How a bug almost ate all of your Facebook photos Researcher reports he can delete photos from anybody’s account, Facebook patches flaw, he collects $12,500 bounty.Read More VirusTotal tackles false positive malware detections plaguing antivirus and software vendors VirusTotal is gathering file metadata from trusted software makers to integrate in its online scanning engine Read More Box gets customer-managed key encryption Fresh off its initial public offering, cloud file synch share and storage company Box has a new Enterprise Key Management (EKM) offering out this week that analysts say could ease customer concerns with using a cloud-based service.Box’s EKM uses Amazon Web Services’ Hardware Security Module (HSM), a device that sits on customers premises to hold keys to encrypted data. Previously, customers relied on Box to encrypt their data and Box held the keys; now, customers get to hold the keys on their own premises.“Yes this is significant news,” says Adrian Sanabria, a security analyst at 451 Research Group. “I’d say that client-side encryption has been a major obstacle to increased cloud/EFSS (Enterprise File Synch and Share) adoption.”To read this article in full or to leave a comment, please click here Read More WHITE PAPER: DomainTools Beyond Whois: The Power of Domain Profiles in Cybersecurity A basic Whois query takes a few seconds but can provide the foundation for an investigation. However, it's often the data that does NOT reside in a Whois record that can be truly illuminating. Like a CarFax report going beyond the vehicle title, there is a wealth of knowledge in other public data. Learn more >> Proposal for altered data retention law is still unlawful, Dutch DPA says Obliging telecom companies to retain customer data for months to help the police catch criminals is disproportionate, the DPA said Read More Information disclosure flaw exposes Netgear wireless routers to attacks The vulnerability allows attackers to extract admin passwords and wireless network keys Read More Cybercriminal gang plunders up to $1 billion from banks over two years Once inside a bank's network, the gang studied how it performed wire transfers in order to better mask fraud Read More Obama pushes for more cyberthreat information sharing The president signs an executive order intended to encourage companies to share more information with each other Read More | ||||||||||
FOR INSIDERS ONLY
Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.
- Review: The big 4 Java IDEs compared - 15 ways to screw up a job interview - 12 tips to tune your Wi-Fi network - Container wars: Interesting times ahead for Docker and its competitors - 6 things every IT person should know - IT Resume Makeover: How (and when) to break the rules | ||||||||||
2015년 2월 17일 화요일
Apple's Tim Cook warns that sacrificing privacy 'risks our way of life'
피드 구독하기:
댓글 (Atom)
댓글 없음:
댓글 쓰기