2015년 2월 19일 목요일

New Outlook for Android, iOS wipes the app, not the phone

 ITworld Security Strategies
Google Plus LinkedIn Facebook Twitter


INSIDER
Your IT security infrastructure, rebooted for 2015 
Cloud, mobile, social media and other factors are conspiring to force companies to reevaluate their security infrastructure, from firewalls to authentication. Read More 


: Citrix Systems

Infographic: Mobile Workspaces 
The number of workers who telecommute is expected to increase 63% in the next 5 years, but the technology to support this is lacking in most organizations. Secure enterprise information and provide the ultimate in productivity with a mobile workspace solution that follows people anywhere, across all their devices. Learn More

WHITE PAPER: Windstream Communications

Security in the Age of Enterprise Technology 
Windstream brings you the latest Nemertes report on how to use network security to create more business opportunities and remove stumbling blocks to progress. Learn More
New Outlook for Android, iOS wipes the app, not the phone 
  Microsoft's new version of Outlook for Android and iOS adds a PIN lock and isolates email, leaving the rest of your phone intact. Read More 

Windows 10 embraces password-killing biometric authentication 
Microsoft joined the FIDO Alliance in 2013 and is ready to add the password-less authentication standard into its flagship product. Read More 

Fanny superworm likely the precursor to Stuxnet 
The worm, used by the Equation cyberespionage group, relied on zero-day exploits that were later used in Stuxnet Read More 

7 social engineering scams and how to avoid them 
Even the most savvy IT professionals can fall victim to social engineering attacks. Here’s how to recognize these threats and avoid falling prey to them. Read More 

Equation cyberspies use unrivaled, NSA-style techniques to hit Iran, Russia 
The group's attack on hard-drive firmware is one of the most advanced ever discovered, Kaspersky Lab said Read More 

There's no way of knowing if the NSA's spyware is on your hard drive 
Russian security software maker Kaspersky Lab published a report all but accusing the NSA of hiding spyware on hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers. And there’s no way to know if it’s on there. Read More 


WHITE PAPER: Rackspace

Do You Know Who is Running Your Cloud? 
Choosing a partner with deep cloud expertise, a track record of leadership, an understanding of your industry, and insight into your business' unique requirements is the clear path for migrating your operations into a scalable, highly available cloud solution. Learn More
8 areas where CSOs and CIOs will converge in 2015 
With enterprise innovations and a changing workforce, not to mention more sophisticated physical and cybersecurity threats, we’re at a time now where CSOs and CIOs have no choice but to play nice in the sandbox. Read More 

What's in a typo? More evidence tying North Korea to the Sony hack 
A security firm says code used against Sony has similarities to other malware linked to North Korea. Read More 

January marked by Java, Flash vulnerabilities 
Newly-disclosed vulnerabilities in Flash and Java were the ones to watch out for this winter, according to a new report by Copenhagen-based security firm Secunia. Read More 

DHS cybersecurity staff won’t get paid during shutdown 
  If Congressional leaders carry through on their threat to shut down the Department of Homeland Security, life for the agency's cybersecurity professionals will be miserable. Read More 

Russian extradited to US for hacks that stole 160 million credit card numbers 
The defendant pleads not guilty to assisting with cyberattacks on Nasdaq, Dow Jones, Heartland and other companiesRead More 

Microsoft adds HTTP Strict Transport Security support to Internet Explorer 
Websites will now be able to instruct the browser to always reach them over HTTPS Read More 
 
 
FOR INSIDERS ONLY
Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

Review: The big 4 Java IDEs compared

15 ways to screw up a job interview

12 tips to tune your Wi-Fi network

Container wars: Interesting times ahead for Docker and its competitors

6 things every IT person should know

IT Resume Makeover: How (and when) to break the rules

What are you waiting for? Sign up today!

 
 
Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

댓글 없음:

댓글 쓰기