Network World Security Alert | | | | Promising new cloud-based endpoint security solutions can change how we protect against cyber intrusions. Read More ▶ | | | White Paper: PC Connection In this white paper, you will learn how PC Connection and EMC have partnered together to offer IT solutions built on the latest, most innovative flash technologies. Read More ▶ | The National Archive blog takes a look at the background of the nation's premier defense unit's tracking of Santa as he travels around the globe delivering his Christmas goodies. Read More ▶ | | While it says it has no reason to think there are backdoors in any of its products, Cisco has started an additional review of code in its products looking for "malicious modifications." Read More ▶ | | Many payment terminals in Germany - and in other countries too -- were designed without following best security principles, making them vulnerable to attacks that could result in mass fraud against both customers and merchants. Read More ▶ | | | An experiment by a cybersecurity research center shows attackers are trying to find Juniper firewalls that haven't been patched to remove unauthorized spying code. Read More ▶ | | As we approach 2016, several security experts joined us to provide their InfoSec Wish List for the new year. Some experts wish for the cyber equivalent of world peace, while others are just hoping for their digital Red Ryder, carbine action, two-hundred shot range model air rifle. Read More ▶ | | Many IT security pros say sharing is good, but with government, not so much. Read More ▶ | | Observations of some of the unsecured security cameras purportedly located in the U.S. Read More ▶ | | The Federal Trade Commission didn't even issue a slap on the wrist to Wyndham Hotels for weak security practices that allowed multiple data breaches. But experts say that wasn't the point – the point was to establish the FTC's authority over companies' cybersecurity practices, and that remains after the recent settlement between the two parties. Read More ▶ | | There's a lot we can say about cybersecurity, identify theft and fraud in 2015, but we're going to let our infographic tell the story. Read More ▶ | | White Paper: PC Connection Although hardware has become more resilient and virtualization has increased service and application portability, most BC/DR plans still fail to adequately protect organizations from harm when the unexpected happens. Read More ▶ | | | |
0 comments:
Post a Comment