Wednesday, January 20, 2016

11 tips for spotting insider threats

Why the "s" in HTTPs is important

Email not displaying correctly? View it in your browser.

Computerworld Security Issues and Trends

Jan 20, 2016
Featured Image
INSIDER

11 tips for spotting insider threats

Security pros are constantly being warned about insider threats. We're told our companies need next-generation software, integrated threat intelligence, and the ability to correlate massive amounts of event logs and context to arm ourselves against these threats. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Why the "s" in HTTPs is important
Linux kernel flaw endangers millions of PCs, servers and Android devices
Compliance does not equal security
Update: Congress eyes commission to tackle encryption debate
The perils of fake users
Sample password protection policy
Faulty ransomware renders files unrecoverable, even by the attacker
Automakers will collaborate to try to prevent car hacks
Advocacy group wants healthcare industry to adopt medical device security principles

White Paper: Cisco Systems

Advanced Malware Protection: Control Advanced Malware with More Visibility

Find out the multiple ways to implement Cisco AMP, from the endpoint to the network, mobile devices, and virtual environments. Read More

Thumbnail Image

Why the "s" in HTTPs is important

Using secure HTTP is especially important when using wireless in a public place. Read More

Thumbnail Image

Linux kernel flaw endangers millions of PCs, servers and Android devices

A three-year-old vulnerability in the Linux kernel could allow attackers to take full control over Linux-based PCs, servers, Android phones and other embedded devices. Patches will be available this week. Read More

Thumbnail Image

Compliance does not equal security

The effort to meet Level 1 PCI compliance reveals a new security mantra to our manager. Read More

Thumbnail Image

Update: Congress eyes commission to tackle encryption debate

Bipartisan congressional legislation is on the way that would create a national commission on security and technology to addresses the growing debate over encryption technology used by terrorists. Read More

Thumbnail Image

The perils of fake users

It's a tough balance to encourage new users, while still ensuring user are who they say they are. Research shows just how tough. Read More

Thumbnail Image
INSIDER

Sample password protection policy

The password protection policy of a large financial services institution with more than 5,000 employees. Read More

Thumbnail Image

Faulty ransomware renders files unrecoverable, even by the attacker

A hacker has built a ransomware program based on proof-of-concept code released online, but messed up the implementation -- resulting in victims' files being completely unrecoverable. Read More

Thumbnail Image

Automakers will collaborate to try to prevent car hacks

Major automakers plan to work with the U.S. government to attempt to deter hacks of connected cars before they become a major issue. Read More

Thumbnail Image

Advocacy group wants healthcare industry to adopt medical device security principles

Advocacy group I Am the Cavalry is urging organizations that manufacture and distribute medical devices to adopt a cybersecurity version of the Hippocratic Oath. Read More

Video/Webcast: EMA Research

Ahead of RSA - Threat Detection Algorithms Make Big Data into Better Data

Join David Monahan of EMA, and Wade Williamson, director of product marketing at Vectra Networks, on February 9th @11AM PST/ 2PM EST for this insightful webinar that explains how threat detection algorithms can replace your Big Data with better data. Read More

IT Careers 2016: What's important to IT professionals?

Check out our January Digital Magazine, which features results from Computerworld's IT Careers 2016 survey. We polled more than 200 IT professionals to learn their top concerns, what's most important to them in their jobs and what would entice them to switch jobs. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security Issues and Trends as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive