Issue highlights
|
: Citrix Systems
Today’s highly mobile employees and line-of-business groups are front-line participants in the struggle to secure the enterprise. This exclusive CSO Magazine eBook shares best practices for leading meaningful security discussions, engaging users to protect business information, and meeting security-related compliance requirements. LEARN MORE
|
Google's Project Zero team, dedicated to finding severe security vulnerabilities, has released research that shows with certain varieties of DRAM an attacker can create privilege escalations by simply repeatedly accessing a given row of memory.READ MORE
|
More than a decade ago, miscreants pioneered the use of infected CHM files to deliver payloads on unsuspecting Windows users. Recently the scam has taken a very lucrative twist, infecting PCs with CryptoWall ransomware attacks.READ MORE
|
Technology-filled smart homes have come a long way since Rosie the robot housekeeper catered to the Jetsons' needs. But one thing the Jetsons never seemed to worry about was Rosie turning on them or being used as a surveillance device. READ MORE
|
Threats are more numerous and more sophisticated; security breaches are more publicized; we've got data-breach disclosure legislation and increased scrutiny of corporate data-handling practices. Where are the pros who can handle all this?READ MORE
|
White Paper: Akamai
According to a new CSO survey, companies know hackers are targeting them, but too few have plans in place for fighting back. Here are the steps you need to take to eliminate the disconnect. LEARN MORE
|
DAILY NEWS, DELIVERED TO YOUR INBOX FIRST THINGStart your workday with Today's Headlines: First Look, and find out what the tech world will be talking about all day. Subscribe now!
|
|
댓글 없음:
댓글 쓰기