Samsung released firmware to patch 20 flaws that if exploited, could have let attackers remotely control and even physically damage IoT gadgets connected the SmartThings Hub. Read More ▶ | | | Video/Webcast: TetraVX In this webinar, Dean Pipes, Chief Innovation Architect at TetraVX, will walk through how each organization's journey to the cloud is different and provide a complete and holistic view of what it takes to build a proper, and cost efficient, strategy and implementation plan. Read More ▶ | After notable presentations and announcements at Google Next, Google must educate the market and turn up the competitive fire Read More ▶ | | Over 30 hours of digital content across 399 lectures, which can be viewed on your computer or mobile device. Read More ▶ | | The TSA has a secret, domestic Quiet Skies surveillance program that includes federal air marshals tracking U.S. travelers not under investigation or suspected of wrongdoing. Read More ▶ | | | Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals -- and how to combat them. Watch Now ▶ | | Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take. Read More ▶ | | Cyber insurance policies do not typically cover physical destruction or loss of life, but the UK government-backed reinsurer, Pool Re, announced this year it will cover acts of cyber officially deemed "terrorism" by Her Majesty's Government. (Did you spot the catch?) Read More ▶ | | White Paper: Hitachi ID Systems, Inc. Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More ▶ | Editor's Picks | | | | |
0 comments:
Post a Comment