2015년 2월 23일 월요일

You’ve been hacked. Now what?

ITworld
ITworld Today
February 23, 2015
INSIDER

You’ve been hacked. Now what?

6 key things to do after a security breach.READ MORE
 

Issue highlights

WHITE PAPER: Citrix Systems

Comprehensive Enterprise Mobile Management for iOS 8

This white paper provides an overview of the new iOS 8 capabilities in comparison to iOS 7 and how Citrix XenMobile makes it easier to manage iOS 8 devices without compromising the user experience. LEARN MORE

Top 10 DNS attacks likely to infiltrate your network

DNS-based attacks are on the rise because many organizations don’t realize DNS is a threat vector and therefore don’t protect it. READ MORE

Attention, rockstar developers: Get a talent agent

High demand, large workloads, and the changing nature of programming work have some developers seeking reps to help them land new gigs. READ MORE
INSIDER

Review: New weapons offer hope against advanced cyber-attacks

Traffic monitoring tools from Damballa, Lanscope, LightCyber can detect hidden malware. READ MORE

Lenovo hit with lawsuit over Superfish snafu

A class-action lawsuit charged Lenovo and Superfish of fraudulent business practices, making PCs vulnerable. READ MORE
WHITE PAPER: Citrix Systems

10 Reasons to Strengthen Security

Data security has become an increasingly critical concern for all organizations. In this paper, we explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security. LEARN MORE

Sony is effectively no longer an electronics company

Once the king of consumer electronics, Sony is now basically a movie studio and videogame company. READ MORE

Apache Spark jumps on the R bandwagon

The big data processing technology looks to draw in data scientists. READ MORE

Facebook, other tech firms face pressure from drivers over work conditions

The increased unionization of drivers reflects unease about growing inequality in Silicon Valley. READ MORE

US judge dismisses antitrust case against Google over Android apps

A U.S. federal judge has dismissed an antitrust lawsuit that charges Google harmed consumers by forcing Android handset makers to use its apps by default, but gave the plaintiffs three weeks to amend their complaint. READ MORE

Box buys Airpost, a startup that keeps tabs on cloud app use

Airpost says it can turn rogue apps in enterprises into productivity assets.READ MORE
WHITE PAPER: DomainTools

Beyond Whois: The Power of Domain Profiles in Cybersecurity

A basic Whois query takes a few seconds but can provide the foundation for an investigation. However, it's often the data that does NOT reside in a Whois record that can be truly illuminating. Like a CarFax report going beyond the vehicle title, there is a wealth of knowledge in other public data. LEARN MORE >>
BECOME AN ITWORLD INSIDER
Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

R programming beginner's guide
IT Resume Makeover: Emphasize your 'X factor'
4 open source monitoring tools that deserve a look
  - Free and cheap ways to learn about IT security
PowerShell for beginners: Scripts and loops
Six Ted talks that can change your career

What are you waiting for? Sign up today!

댓글 없음:

댓글 쓰기