Wednesday, March 2, 2016

4 hiring tips to attract top infosec talent

Crypto dream team Diffie and Hellman wins $1M A.M. Turing Award

Email not displaying correctly? View it in your browser.

Computerworld Security Issues and Trends

Mar 02, 2016
Featured Image
INSIDER

4 hiring tips to attract top infosec talent

Top-notch security pros are hard to find, leaving companies struggling to fill positions. Here's what businesses need to change to gain a competitive edge. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Crypto dream team Diffie and Hellman wins $1M A.M. Turing Award
FBI director admits mistake was made with San Bernardino iCloud reset
The FBI should try to unlock a shooter's iPhone without Apple's help, a lawmaker says
New TLS decryption attack affects one in three servers due to legacy SSLv2 support
Review: 5 application security testing tools compared
Egnyte offers flexible key management
How to identify a stolen iPhone
Ukraine power outage was a cyberattack -- U.S. doesn't finger Russia (officially)
Malvertising campaigns are becoming harder to detect
Here's the password you should never use for an RDP system
IBM to buy Resilient Systems, bringing security guru Bruce Schneier on board
Gee, thanks, boss!
5 things you need to know about the EU-US Privacy Shield agreement

Video/Webcast: Software AG Inc

API Clouds for Faster APIs - Leveraging Existing Assets for the API Economy

Watch Digital Transformation thought leader Jason Bloomberg, Forbes contributor and president of Intellyx, and David Overos from Software AG expain the role APIs play in enterprise digital initiatives, and how to leverage an API Cloud. Read More

Thumbnail Image

Crypto dream team Diffie and Hellman wins $1M A.M. Turing Award

Whitfield Diffie and Martin Hellman, whose names have been linked since their seminal 1976 paper introduced the concepts of public key encryption and digital signatures, have been named winners of the 2015 ACM A.M. Turing Award. Read More

Thumbnail Image

FBI director admits mistake was made with San Bernardino iCloud reset

FBI Director James Comey conceded it was a mistake to ask San Bernardino County to reset the password of an iCloud account that had been used by gunman Syed Farook. Read More

Thumbnail Image

The FBI should try to unlock a shooter's iPhone without Apple's help, a lawmaker says

The FBI might be able to copy the hard drive of an iPhone used by a mass shooter without triggering the device's auto-erase functions, thus eliminating the agency's need to take Apple to court, a company executive said Tuesday. Read More

Thumbnail Image

New TLS decryption attack affects one in three servers due to legacy SSLv2 support

Security researchers have discovered a new weakness that could allow attackers to spy on encrypted communications between users and a third of all HTTPS servers. Read More

Thumbnail Image
INSIDER

Review: 5 application security testing tools compared

Users weigh in on favorite features, room for improvement. Read More

Thumbnail Image

Egnyte offers flexible key management

Encryption has been, ever since the Snowden revelations, the topic du jour. Egnyte is giving customers ultimate flexibility over encryption keys. Read More

Thumbnail Image

How to identify a stolen iPhone

Don't buy stolen iPhones Read More

Thumbnail Image

Ukraine power outage was a cyberattack -- U.S. doesn't finger Russia (officially)

A late-December power outage in Ukraine was caused by attackers wielding malware weapons, says a U.S. report. Unofficial briefings point the finger at Russia, as do official statements from Ukraine, but could the same happen here? Read More

Thumbnail Image

Malvertising campaigns are becoming harder to detect

Jerome Segura, a senior security researcher with Malwarebytes, was recently stumped by a cyberattack he was studying. It seemed to keep vanishing. Read More

Thumbnail Image

Here's the password you should never use for an RDP system

A year-long experiment that baited hackers to try and break into systems netted an interesting result: a single letter, x, was one of the most common password guesses. Read More

Thumbnail Image

IBM to buy Resilient Systems, bringing security guru Bruce Schneier on board

IBM will acquire Resilient Systems, and along with the company it will gain a big name in the security world: Bruce Schneier. Read More

Gee, thanks, boss!

CFO of this 100-person company understands there are security risks with malware and questionable emails -- but he's not quite clear on the appropriate follow-through. Read More

Thumbnail Image

5 things you need to know about the EU-US Privacy Shield agreement

The Privacy Shield agreement is intended to guarantee the personal information of European Union citizens the same privacy protection when processed in the U.S. as it would receive at home. Here are five things to know about the agreement. Read More

Data Sheet: Software AG Inc

API Management Fact Sheet

With an integrated infrastructure from Software AG, you can manage the entire life cycle of your APIs. API Management powered by webMethods allows you to securely expose your APIs to external developers and partners. Read More

The 2016 Premier 100 Technology Leaders

Check out our March Digital Magazine, featuring this year's class of honorees: The 2016 Premier 100 Technology Leaders. It's a chaotic world for this year's honorees, but that's just how they like it, as they embrace countless ways to spearhead change at their organizations, from shaking up the IT structure to driving technology investments. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security Issues and Trends as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive