Network World Security Alert | | | | From Bill Gates to cool drones and space shots it was a cool year, mostly. Read More ▶ | | | White Paper: Sophos Inc This whitepaper provides an overview of encryption, things to consider when planning an encryption strategy and what to look out for when choosing an encryption solution. Read More ▶ | It's that time of year again when we take a look at some of the most interesting and sometimes silly sci/tech stories of the year. This year we have flame-throwing drones, wicked cool pictures of Pluto and quantum computing advancements to name just a few topics. Take a look. Read More ▶ | | Cybercriminals are becoming more sophisticated and collaborative with every coming year. To combat the threat in 2016, information security professionals must understand these five trends. Read More ▶ | | As we approach 2016, several security experts joined us to provide their InfoSec Wish List for the new year. Some experts wish for the cyber equivalent of world peace, while others are just hoping for their digital Red Ryder, carbine action, two-hundred shot range model air rifle. Read More ▶ | | | Observations of some of the unsecured security cameras purportedly located in the U.S. Read More ▶ | | We're already accustomed to cameras everywhere, in security and other fixed applications, and cameras are mainstream in mobile. Cars and drones are the next logical applications for cameras, and the use cases are already established and gaining momentum. The trend will introduce a new field of innovation and opportunity that I call "cameras in motion." Read More ▶ | | IOS XE 16.1.1 for Catalyst 3850, 3650 could allow attackers to reload devices Read More ▶ | | There's a lot we can say about cybersecurity, identify theft and fraud in 2015, but we're going to let our infographic tell the story. Read More ▶ | | Smart TVs are opening a new window of attack for cybercriminals, as their security defenses often lag far behind those of smartphones and desktop computers. Read More ▶ | | White Paper: Sophos Inc This guide details the capabilities to look for when evaluating endpoint encryption solutions. Read More ▶ | | | |
0 comments:
Post a Comment