2015년 3월 8일 일요일

Time to FREAK out? How to tell if you're vulnerable


ITworld Security Strategies
Google Plus LinkedIn Facebook Twitter

Drive-by attack relies on hacked GoDaddy accounts 
The Angler exploit kit is using subdomains created by cybercriminals on real domain name accounts as part of its infrastructure Read More 
 

WHITE PAPER: Citrix Systems

10 Essentials for Secure EMM 
This white paper highlights 10 key points encompassing security, user experience, IT operations and BYOD to help your organization realize the full benefits of mobility. Learn more

WHITE PAPER: K2

A Better BPM 
  When driving any major change within an organization, strategy and execution are intrinsic to a project's success. Nevertheless, closing the gap between strategy and execution remains a challenge for many organizations, an issue explored in this whitepaper. Learn more >>
Time to FREAK out? How to tell if you're vulnerable 
Not everyone is vulnerable to the FREAK flaw researchers disclosed on Tuesday. Here's how to tell if you are. Read More

Is your security software sitting unused on the shelf? 
  Your security software isn't working? It could be because your company is one of the many that doesn't actually use the products they buy. Read More 

Who 'owns' an investigation into a security breach? 
When things go wrong, as they inevitably will in any organization, the way to resolve those problems starts with an effective investigation. But an advisory council says too often those investigations are plagued with confusion and disorganization. The solution, the council says, is Unified Risk Oversight. Read More 

What happens inside Amazon when there’s a Xen vulnerability 
When a Xen vulnerability is found, Amazon security engineers scramble to respond. Read More 


RESOURCE COMPLIMENTS OF: CSO Security Smart

Security Smart: The Employee Security Awareness Newsletter 
  Security Smart is a quarterly security awareness newsletter ready for distribution to your employees— saving you precious time on employee education! The compelling content combines personal and organization safety tips so is applicable to many facets of employees’ lives. Click to continue

INSIDER
How to connect to enterprise Wi-Fi security on Android devices 
Connecting to wireless networks using the enterprise or 802.1X mode of Wi-Fi security is a bit different compared to using the personal or pre-shared key (PSK) mode. Here's what you need to know. Read More 

Geofencing could add security layer for mobile devices 
  Geofencing technology -- tracking the location of a mobile device -- could offer an extra layer of security for enterprises trying to manage both company-owned and employee-owned devices. However, the technology can also raise worries about privacy and battery life. Read More 


INSIDER
Attackers clone malware-laden copies of popular apps 
Criminal hackers have hacked/cloned most of the top 100 paid apps and top 20 free apps for Android and iOS, according to data from Arxan’s State of Mobile App Security report, 2014. Read More 

China says new cybersurveillance proposal follows US security practices 
The U.S. argues China's anti-terrorism law would require foreign tech businesses to hand over sensitive data to the government Read More 
 
 
BECOME AN ITWORLD INSIDER
Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

R programming beginner's guide
IT Resume Makeover: Emphasize your 'X factor'
4 open source monitoring tools that deserve a look
Free and cheap ways to learn about IT security
PowerShell for beginners: Scripts and loops
Six Ted talks that can change your career

What are you waiting for? Sign up today!
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

댓글 없음:

댓글 쓰기