|
White Paper: Bitsight Technologies In a recent IDG survey of more than 260 IT managers and professionals, nearly 70% said they are extremely or very concerned about the security risks posed by third-party vendors and suppliers. Despite this awareness, relatively few companies have implemented the comprehensive vendor risk management (VRM) programs that this threat warrants. Read More ▶ |
The two major international security agencies in Europe agree that building backdoors into encryption platforms is not the best way to go because of the collateral damage it would do to privacy and the security of communications systems. Read More ▶ | |
The thousands of endpoints in IoT systems may have to protect themselves against thousands of dangers. A decades-old IT lab wants to tell you if they're up to the task. Read More ▶ | |
Enterprise employees use mobile apps every day to get their jobs done, but when malicious actors start impersonating those apps, it spells trouble for IT departments everywhere. Here are 5 apps that masquerade as real apps. Read More ▶ | |
|
Many WordPress-, Joomla-, Magento- and Drupal-driven websites aren't being updated, making them susceptible to phishing exploits and malware. Read More ▶ | |
A Romanian hacker known online as Guccifer pleaded guilty to hacking into 100 email and social media accounts belonging to American citizens, including former high-ranking government officials. Read More ▶ | |
Up to 12 banks have reportedly launched investigations into potential security breaches on their networks after hackers stole $81 million from the Bangladesh central bank earlier this year. Read More ▶ | |
A team from Google's fraud-detection group has started up its own software as a service venture for spotting transaction fraud quickly based on rule sets but that also learns as it goes to improve its hit rate. Read More ▶ | |
Researchers with the Defense Advanced Research Projects Agency (DARPA) have quickly moved to alter the way the military, public and private enterprises protect their networks from high-and low-speed distributed denial-of-service attacks with a program called Extreme DDoS Defense (XD3). Read More ▶ | |
Case Study: Citrix Systems Franciscan Missionaries of Our Lady Health System (FMOLHS), the largest health system in Louisiana, addresses challenges around the secure delivery of EMR, the growth of mobile and BYO devices used by clinicians and the increasing risk of HIPAA security breaches, while reducing IT costs. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS Top 10 ways to retain IT security talent Read More ▶ |
Most-Read Stories |
0 comments:
Post a Comment