Connected medical devices bring life-sustaining therapy and convenience to millions of people. But they remain vulnerable to online attackers. The goal of some security companies is to change that. Read More ▶ | | | White Paper: SanDisk Cloud architects designing public and private clouds must satisfy business needs while meeting cloud infrastructure scale, performance, and agility requirements. This is why flash technology has become an integral part of storage needs for cloud applications moving forward and will continue to be an important part of data center design in the future. Read More ▶ | Welcome to this week's edition of Rehashed, your weekly recap of news and other items of note. We're going to start running these on Friday, mostly because it's easier to produce this way. This week, a trusted contact Phished me, there were issues with Pornhub, and once again LinkedIn users need to reset their passwords. Read More ▶ | | Male privilege and its impact on work place diversity and culture in the tech industry Read More ▶ | | Security threats weigh heavily on IT and security professionals, and it is a responsibility that they should not bear alone. We all need to do our part to uphold the safeguarding of sensitive data. Read More ▶ | | | In my last post I discussed how machine learning could be used to detect phishing-based account compromise attacks using a real-world use case from the recent Verizon Data Breach Digest. This time I'll examine how to detect insider threats using similar techniques. Read More ▶ | | White Paper: Sophos Inc This whitepaper provides an overview of encryption, things to consider when planning an encryption strategy and what to look out for when choosing an encryption solution. Read More ▶ | Top 5 Stories | Editor's Picks | | | |
0 comments:
Post a Comment