|
White Paper: Cisco Systems Find out the multiple ways to implement Cisco AMP, from the endpoint to the network, mobile devices, and virtual environments. Read More ▶ |
Using secure HTTP is especially important when using wireless in a public place. Read More ▶ | |
A three-year-old vulnerability in the Linux kernel could allow attackers to take full control over Linux-based PCs, servers, Android phones and other embedded devices. Patches will be available this week. Read More ▶ | |
The effort to meet Level 1 PCI compliance reveals a new security mantra to our manager. Read More ▶ | |
|
Bipartisan congressional legislation is on the way that would create a national commission on security and technology to addresses the growing debate over encryption technology used by terrorists. Read More ▶ | |
It's a tough balance to encourage new users, while still ensuring user are who they say they are. Research shows just how tough. Read More ▶ | |
The password protection policy of a large financial services institution with more than 5,000 employees. Read More ▶ | |
A hacker has built a ransomware program based on proof-of-concept code released online, but messed up the implementation -- resulting in victims' files being completely unrecoverable. Read More ▶ | |
Major automakers plan to work with the U.S. government to attempt to deter hacks of connected cars before they become a major issue. Read More ▶ | |
Advocacy group I Am the Cavalry is urging organizations that manufacture and distribute medical devices to adopt a cybersecurity version of the Hippocratic Oath. Read More ▶ | |
Video/Webcast: EMA Research Join David Monahan of EMA, and Wade Williamson, director of product marketing at Vectra Networks, on February 9th @11AM PST/ 2PM EST for this insightful webinar that explains how threat detection algorithms can replace your Big Data with better data. Read More ▶ |
Check out our January Digital Magazine, which features results from Computerworld's IT Careers 2016 survey. We polled more than 200 IT professionals to learn their top concerns, what's most important to them in their jobs and what would entice them to switch jobs. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here ▶ |
Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now ▶ |
Search multiple listings now and get new job alerts as they are posted. Check them out now ▶ |
0 comments:
Post a Comment