ITworld Security Strategies | |||||||||||
Drive-by attack relies on hacked GoDaddy accounts
The Angler exploit kit is using subdomains created by cybercriminals on real domain name accounts as part of its infrastructure Read More WHITE PAPER: Citrix Systems 10 Essentials for Secure EMM This white paper highlights 10 key points encompassing security, user experience, IT operations and BYOD to help your organization realize the full benefits of mobility. Learn more
In this Issue
WHITE PAPER: K2 A Better BPM When driving any major change within an organization, strategy and execution are intrinsic to a project's success. Nevertheless, closing the gap between strategy and execution remains a challenge for many organizations, an issue explored in this whitepaper. Learn more >> Time to FREAK out? How to tell if you're vulnerable Not everyone is vulnerable to the FREAK flaw researchers disclosed on Tuesday. Here's how to tell if you are. Read More Is your security software sitting unused on the shelf? Your security software isn't working? It could be because your company is one of the many that doesn't actually use the products they buy. Read More Who 'owns' an investigation into a security breach? When things go wrong, as they inevitably will in any organization, the way to resolve those problems starts with an effective investigation. But an advisory council says too often those investigations are plagued with confusion and disorganization. The solution, the council says, is Unified Risk Oversight. Read More What happens inside Amazon when there’s a Xen vulnerability When a Xen vulnerability is found, Amazon security engineers scramble to respond. Read More RESOURCE COMPLIMENTS OF: CSO Security Smart Security Smart: The Employee Security Awareness Newsletter Security Smart is a quarterly security awareness newsletter ready for distribution to your employees— saving you precious time on employee education! The compelling content combines personal and organization safety tips so is applicable to many facets of employees’ lives. Click to continue
Connecting to wireless networks using the enterprise or 802.1X mode of Wi-Fi security is a bit different compared to using the personal or pre-shared key (PSK) mode. Here's what you need to know. Read More Geofencing could add security layer for mobile devices Geofencing technology -- tracking the location of a mobile device -- could offer an extra layer of security for enterprises trying to manage both company-owned and employee-owned devices. However, the technology can also raise worries about privacy and battery life. Read More
Criminal hackers have hacked/cloned most of the top 100 paid apps and top 20 free apps for Android and iOS, according to data from Arxan’s State of Mobile App Security report, 2014. Read More China says new cybersurveillance proposal follows US security practices The U.S. argues China's anti-terrorism law would require foreign tech businesses to hand over sensitive data to the government Read More | |||||||||||
BECOME AN ITWORLD INSIDER
Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.
- R programming beginner's guide - IT Resume Makeover: Emphasize your 'X factor' - 4 open source monitoring tools that deserve a look - Free and cheap ways to learn about IT security - PowerShell for beginners: Scripts and loops - Six Ted talks that can change your career What are you waiting for? Sign up today!
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.
|
2015년 3월 8일 일요일
Time to FREAK out? How to tell if you're vulnerable
피드 구독하기:
댓글 (Atom)
댓글 없음:
댓글 쓰기