As mobile devices continue to penetrate our society, mobile security is becoming increasingly difficult to manage. Every mobile device we own, whether it's a phone or a tablet, provides hackers with a new avenue to seize private information in a variety of ways. It is important to take the steps in this story to keep mobile devices protected. Read More ▶ | | | White Paper: Keeper Security Weak passwords are at the heart of the rise in cyber theft, causing 76% of data breaches. To mitigate this risk, businesses are adopting password management solutions. This is a comprehensive password management evaluation guide with recommended security, implementation and productivity requirements. Read More ▶ | Since last week attackers have exploited an unpatched vulnerability in a WordPress plug-in called WP Mobile Detector that was installed on over 10,000 websites. Read More ▶ | | The European Commission has signed a landmark agreement with the U.S. in its quest to legitimize the transatlantic flow of European Union citizens' personal information. Read More ▶ | | Prominent Windows PC makers have made "egregious" omissions in the software updaters they bundle with notebooks that leave customers at risk from cyberattack. Read More ▶ | | | White Paper: Hewlett Packard Enterprise The enterprise attack surface continues to expand. Network borders are evaporating as data scatters across cloud, mobile, remote, and partner and other third-party environments. Multiple entry points into the network have appeared, prompting sophisticated data thieves to unite globally and create pro table data-theft businesses. How are companies coping? Read More ▶ | Which carrier's users are the most satisfied with their mobile data service? That's what we want to find out. For the fourth year, Computerworld is polling readers to find out how they feel about their mobile data provider, how much they pay, how they use their mobile data connections and more. Take the survey here ▶ | Check out our May Digital Magazine, featuring an in-depth story on the EU's new data protection regulations and the pressure on IT teams to achieve compliance. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here ▶ | Computerworld has launched its annual search for 100 technology professionals who have demonstrated leadership in their organizations through the use of technology and have the strategic vision to align technology with business goals. The deadline for nominating a candidate for the Premier 100 Technology Leaders awards is Aug. 31, 2016. Make a nomination today! ▶ | Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now ▶ | Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now ▶ | Search multiple listings now and get new job alerts as they are posted. Check them out now ▶ | | | |
0 comments:
Post a Comment