Friday, March 4, 2016

AT&T, Verizon call for federal action on encryption policy

San Bernardino prosecutor raises 'cyber pathogen' concerns in terrorist's iPhone

Email not displaying correctly? View it in your browser.

Computerworld Security

Mar 04, 2016
Featured Image

AT&T, Verizon call for federal action on encryption policy

The two carriers are directly affected by any outcome affecting encryption policy that could come from the nation's courts or Congress. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

San Bernardino prosecutor raises 'cyber pathogen' concerns in terrorist's iPhone
5 ways to stop malware in the cloud
Cisco issues critical patch for Nexus switches to remove hardcoded credentials
Defense chief says cyber fight against ISIS will 'black these guys out'
Billboards can track your location, and privacy advocates don't like it
Good security begins with the endpoint in mind

White Paper: Tempered Networks

Helping Enterprises Become Secure by Default

The intensity of cyber attacks and proliferation of devices and non-traditional endpoints has radically changed the security environment from what it was just three years ago. Read More

Thumbnail Image

San Bernardino prosecutor raises 'cyber pathogen' concerns in terrorist's iPhone

The district attorney of San Bernardino County, Michael Ramos, has raised concerns about the possibility of a 'dormant cyber pathogen' in the iPhone 5c used by a terrorist in attacks in the county on Dec. 2. Read More

Thumbnail Image
INSIDER

5 ways to stop malware in the cloud

An analysis of data stored in cloud applications found that 4 out of every 100 files contains malware. The spells data breaches and ransomware attacks. Read More

Thumbnail Image

Cisco issues critical patch for Nexus switches to remove hardcoded credentials

Cisco Systems has released software updates for its Nexus 3000 and 3500 switches to remove a default administrative account with static credentials that could allow remote attackers to compromise devices. Read More

Thumbnail Image

Defense chief says cyber fight against ISIS will 'black these guys out'

The U.S. is aggressively targeting ISIS in cyberspace, attempting to halt the group's ability to communicate electronically, Secretary of Defense Ash Carter said Thursday. Read More

Thumbnail Image

Billboards can track your location, and privacy advocates don't like it

A geolocation-tracking feature on billboards owned by Clear Channel Outdoor gives the company new ways to target advertising and measure its effectiveness, but is also raising privacy concerns. Read More

Thumbnail Image

Good security begins with the endpoint in mind

In my work with new customers, I have yet to find a single one who has even a simple majority of workstations -- or endpoints as they are often known -- patched properly. Since much of the malware in existence takes advantage of known vulnerabilities, endpoint patch management is the front line of network security. This article will review the common excuses for poor patch practices, and offer specific suggestions for improvement. Read More

White Paper: Tempered Networks

The Answer to Next-Generation Security Threats

This paper takes an industry-specific look at next-generation security offerings that use cryptographic identifiers, network micro-segmentation, and other innovative technologies to enforce a powerful, flexible "zero trust" IP communications model. Read More

The 2016 Premier 100 Technology Leaders

Check out our March Digital Magazine, featuring this year's class of honorees: The 2016 Premier 100 Technology Leaders. It's a chaotic world for this year's honorees, but that's just how they like it, as they embrace countless ways to spearhead change at their organizations, from shaking up the IT structure to driving technology investments. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive