Friday, May 27, 2016

DARPA wants to find the vital limitations of machine learning

Euro agencies on encryption backdoors: Create 'decryption without weakening'

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

May 27, 2016
Featured Image

DARPA wants to find the vital limitations of machine learning

That's the central question of a potential new DARPA program known as the Fundamental Limits of Learning (Fun LoL) which according to the researchers will address how the quest for the ultimate learning machine can be measured and tracked in a systematic and principled way. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Euro agencies on encryption backdoors: Create 'decryption without weakening'
IoT security is getting its own crash tests
5 active mobile threats spoofing enterprise apps
Most CMS-run websites have obsolete software and are vulnerable to attack
Celebrity hacker Guccifer's confession gives us all a lesson in security
Up to a dozen banks are reportedly investigating potential SWIFT breaches
Google alums rollout Simility fraud-detection platform
DARPA extreme DDOS project transforming network attack mitigation

White Paper: Bitsight Technologies

Don't Let "Trusted" Vendors Become Cyber-Breach Enablers

In a recent IDG survey of more than 260 IT managers and professionals, nearly 70% said they are extremely or very concerned about the security risks posed by third-party vendors and suppliers. Despite this awareness, relatively few companies have implemented the comprehensive vendor risk management (VRM) programs that this threat warrants. Read More

Thumbnail Image

Euro agencies on encryption backdoors: Create 'decryption without weakening'

The two major international security agencies in Europe agree that building backdoors into encryption platforms is not the best way to go because of the collateral damage it would do to privacy and the security of communications systems. Read More

Thumbnail Image

IoT security is getting its own crash tests

The thousands of endpoints in IoT systems may have to protect themselves against thousands of dangers. A decades-old IT lab wants to tell you if they're up to the task. Read More

Thumbnail Image

5 active mobile threats spoofing enterprise apps

Enterprise employees use mobile apps every day to get their jobs done, but when malicious actors start impersonating those apps, it spells trouble for IT departments everywhere. Here are 5 apps that masquerade as real apps. Read More

Thumbnail Image

Most CMS-run websites have obsolete software and are vulnerable to attack

Many WordPress-, Joomla-, Magento- and Drupal-driven websites aren't being updated, making them susceptible to phishing exploits and malware. Read More

Thumbnail Image

Celebrity hacker Guccifer's confession gives us all a lesson in security

A Romanian hacker known online as Guccifer pleaded guilty to hacking into 100 email and social media accounts belonging to American citizens, including former high-ranking government officials. Read More

Thumbnail Image

Up to a dozen banks are reportedly investigating potential SWIFT breaches

Up to 12 banks have reportedly launched investigations into potential security breaches on their networks after hackers stole $81 million from the Bangladesh central bank earlier this year. Read More

Thumbnail Image

Google alums rollout Simility fraud-detection platform

A team from Google's fraud-detection group has started up its own software as a service venture for spotting transaction fraud quickly based on rule sets but that also learns as it goes to improve its hit rate. Read More

Thumbnail Image

DARPA extreme DDOS project transforming network attack mitigation

Researchers with the Defense Advanced Research Projects Agency (DARPA) have quickly moved to alter the way the military, public and private enterprises protect their networks from high-and low-speed distributed denial-of-service attacks with a program called Extreme DDoS Defense (XD3). Read More

Case Study: Citrix Systems

Franciscan Missionaries of Our Lady Health Speeds Clinician Access to Critical Patient Data

Franciscan Missionaries of Our Lady Health System (FMOLHS), the largest health system in Louisiana, addresses challenges around the secure delivery of EMR, the growth of mobile and BYO devices used by clinicians and the increasing risk of HIPAA security breaches, while reducing IT costs. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

20 best new iPhone, iPad games

Top 10 ways to retain IT security talent Read More

Most-Read Stories

1. Not dead yet: 7 of the oldest federal IT systems still wheezing away
2. This is what the iPhone 7 will probably look like
3. Top 30 AWS cloud services
4. FCC formalizes massive fines for selling, using cell-phone jammers
5. Why I stay with Firefox
6. Cisco ACI and VMware NSX kumbaya?
7. Top Raspberry Pi news of the week
8. 19 free cloud storage options
9. Windows 7 updates have been broken for several days
10. 7 free tools every network needs
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive