|
White Paper: Paladion Networks With the cyber attack landscape changing daily, network infrastructure needs to respond at a similar rate. Read More ▶ |
The truth behind the hype and misunderstandings surrounding the case. Read More ▶ | |
On the latest models of the iPhone, however, Secure Enclave (SE) -- a co-processor fabricated as part of the A7 -- makes it difficult if not impossible to help law enforcement. Apple does not know or have a record of the key embedded in the SE. Read More ▶ | |
Like it or not, you're going to have to take sides in the brewing fight between the FBI and Apple over iPhone encryption. Read More ▶ | |
|
Hollywood Presbyterian Medical Center was forced to pay a ransom if it wanted its critical data back from hackers who encrypted its computers. The hospital's CEO announced he'd spent around $17,000 in Bitcoin -- after a week of failure to restore important health data, email, and other critical stuff, presumably... Read More ▶ | |
Information security is a complex discipline in itself, complicated by the alphabet soup of standards and regulations which exist. The myriad of standards just adds to the intimidation no doubt felt by folks on the business side who are forced to put together an information security program that protects the business and the customer, and prevents a knock on the door by dark suits representing some regulatory body. This article will attempt to demystify this complexity of standards. Read More ▶ | |
Twitter has notified 10,000 users that their email address and phone number might have been exposed due to a bug in the website's password recovery feature. Read More ▶ | |
AV-Test, a well-respected independent IT-security institute, announced the best antivirus award winners. Read More ▶ | |
Video/Webcast: Paladion Networks In today's ever-changing threat landscape, compliance is an essential part of an organization's' security processes. The "UAEIA Standard" outlined by the National Electronic Security Authority is designed to secure information infrastructures. Read More ▶ |
Check out our February Digital Magazine, with a cover story on how organizations are focusing their re-engineering efforts on customer demands. Also inside: How humanitarian groups are using big data to improve response efforts, and the pros and cons of an open-source career. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here ▶ |
Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now ▶ |
Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now ▶ |
Search multiple listings now and get new job alerts as they are posted. Check them out now ▶ |
0 comments:
Post a Comment