CSO Update | | It seems like almost daily that we find a new front-page article about a sophisticated data breach. But, more often than not, data breaches are initiated by low tech means. Here are three common low-tech attack vectors, and suggestions for how security teams can address them. READ MORE | | Issue highlights 1. 10 changes you can make to achieve security serenity now! 2. Major Chinese smartphone manufacturer installed backdoor on up to 10 million devices 3. IDG Contributor Network: Going beyond gender for the agenda 4. Organized criminals targeting individual iPhone, Android users | White Paper: Citrix Systems Today's highly mobile employees and line-of-business groups are front-line participants in the struggle to secure the enterprise. This exclusive CSO Magazine eBook shares best practices for leading meaningful security discussions, engaging users to protect business information, and meeting security-related compliance requirements. Learn more | Some security changes are slow, expensive, and uncertain. Here are 10 of the best security changes that you can make with certainty, most of them with relative ease. READ MORE | Webcast: APC by Schneider Electric A number of forces are converging: the cloud, converged infrastructure, big data and fabric architectures to name a few. And if those weren't enough, data center professionals must keep systems up 24 by 7, keep data secure, meet compliance obligations and keep costs and energy usage under control. It's a tall order. Learn More | Coolpad, the world's sixth largest smartphone manufacturer, installed a back door that allows the company to install applications, send alerts, and monitor communications without user knowledge or approval READ MORE | White Paper: Brother International Corp. Web conferencing is now nearly ubiquitous. At the same time, new research shows that some concerns over the technology linger, particularly about security and ease of use and administration. Read this white paper to learn about technologies that can help address these challenges, both in the public and private cloud. Learn More | We've all seen tech conference with only male speakers on the agenda. What would it be like to have a conference agenda populated only with women, but not a "women in tech" event? And what can this show us about increasing diversity in tech, not just for gender but for other under-representated groups as well? READ MORE | A well organized criminal group is targeting both iOS and Android users with highly targeted man-in-the-middle attacks, according to a new threat advisory from Akamai Technologies READ MORE | White Paper: Jive Software With its in-depth guidance and independent third-party vendor evaluations, Gartner's Magic Quadrant market assessment can assist your organization in implementing an effective communication and collaboration solution. The full report covers 17 vendors, with specific information on their ability to execute and completeness of vision. Learn more. | | | | | |
0 comments:
Post a Comment