ITworld Security Strategies | ||||||||||
Cloud, mobile, social media and other factors are conspiring to force companies to reevaluate their security infrastructure, from firewalls to authentication. Read More : Citrix Systems Infographic: Mobile Workspaces The number of workers who telecommute is expected to increase 63% in the next 5 years, but the technology to support this is lacking in most organizations. Secure enterprise information and provide the ultimate in productivity with a mobile workspace solution that follows people anywhere, across all their devices. Learn More
In this Issue
WHITE PAPER: Windstream Communications Security in the Age of Enterprise Technology Windstream brings you the latest Nemertes report on how to use network security to create more business opportunities and remove stumbling blocks to progress. Learn More New Outlook for Android, iOS wipes the app, not the phone Microsoft's new version of Outlook for Android and iOS adds a PIN lock and isolates email, leaving the rest of your phone intact. Read More Windows 10 embraces password-killing biometric authentication Microsoft joined the FIDO Alliance in 2013 and is ready to add the password-less authentication standard into its flagship product. Read More Fanny superworm likely the precursor to Stuxnet The worm, used by the Equation cyberespionage group, relied on zero-day exploits that were later used in Stuxnet Read More 7 social engineering scams and how to avoid them Even the most savvy IT professionals can fall victim to social engineering attacks. Here’s how to recognize these threats and avoid falling prey to them. Read More Equation cyberspies use unrivaled, NSA-style techniques to hit Iran, Russia The group's attack on hard-drive firmware is one of the most advanced ever discovered, Kaspersky Lab said Read More There's no way of knowing if the NSA's spyware is on your hard drive Russian security software maker Kaspersky Lab published a report all but accusing the NSA of hiding spyware on hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers. And there’s no way to know if it’s on there. Read More WHITE PAPER: Rackspace Do You Know Who is Running Your Cloud? Choosing a partner with deep cloud expertise, a track record of leadership, an understanding of your industry, and insight into your business' unique requirements is the clear path for migrating your operations into a scalable, highly available cloud solution. Learn More 8 areas where CSOs and CIOs will converge in 2015 With enterprise innovations and a changing workforce, not to mention more sophisticated physical and cybersecurity threats, we’re at a time now where CSOs and CIOs have no choice but to play nice in the sandbox. Read More What's in a typo? More evidence tying North Korea to the Sony hack A security firm says code used against Sony has similarities to other malware linked to North Korea. Read More January marked by Java, Flash vulnerabilities Newly-disclosed vulnerabilities in Flash and Java were the ones to watch out for this winter, according to a new report by Copenhagen-based security firm Secunia. Read More DHS cybersecurity staff won’t get paid during shutdown If Congressional leaders carry through on their threat to shut down the Department of Homeland Security, life for the agency's cybersecurity professionals will be miserable. Read More Russian extradited to US for hacks that stole 160 million credit card numbers The defendant pleads not guilty to assisting with cyberattacks on Nasdaq, Dow Jones, Heartland and other companiesRead More Microsoft adds HTTP Strict Transport Security support to Internet Explorer Websites will now be able to instruct the browser to always reach them over HTTPS Read More | ||||||||||
FOR INSIDERS ONLY
Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.
- Review: The big 4 Java IDEs compared - 15 ways to screw up a job interview - 12 tips to tune your Wi-Fi network - Container wars: Interesting times ahead for Docker and its competitors - 6 things every IT person should know - IT Resume Makeover: How (and when) to break the rules What are you waiting for? Sign up today! | ||||||||||
2015년 2월 19일 목요일
New Outlook for Android, iOS wipes the app, not the phone
피드 구독하기:
댓글 (Atom)
댓글 없음:
댓글 쓰기