Thursday, June 30, 2016

ACLU lawsuit challenges U.S. computer hacking law

The devil is in the details: The importance of tight processes to strong information security

Email not displaying correctly? View it in your browser.

Computerworld Security

Jun 30, 2016
Featured Image

ACLU lawsuit challenges U.S. computer hacking law

The American Civil Liberties Union has filed a lawsuit challenging a 30-year-old hacking crimes law, saying the law inhibits research about online discrimination. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The devil is in the details: The importance of tight processes to strong information security
Security vulnerabilities in Symantec and Norton 'as bad as it gets' warns researcher
How iOS 10 will collect and use your data
Resold hard drives on eBay, Craigslist are still ripe with leftover data
Researchers dismantle Iranian cyberespionage operation
Mobile ransomware jumps, blocking access to phones

Video/Webcast: Hewlett Packard Enterprise

Cybersecurity Crisis-Communication Planning

The bad guys just won. Now what? The first 48 hours are crucial when responding to breaches, and most organization lack a plan to keep stakeholders informed. MIT Technology Review talks with HPE and FireEye on how to build a strong crisis-communication framework before criminals come calling. Read More

Thumbnail Image

The devil is in the details: The importance of tight processes to strong information security

Have you ever pulled a policy or procedure down from the internet, changed a few things and called it your own? If not, you are probably one of a small minority. Since such documents are the basis of processes that make your operation go, they must be specific to your organization, known to your team and your customers, and followed specifically. Doing so will help to minimize your risks, and help you achieve tight information security and privacy practices. Read More

Thumbnail Image

Security vulnerabilities in Symantec and Norton 'as bad as it gets' warns researcher

Google Project Zero security researcher Tavis Ormandy warned of multiple critical vulnerabilities in Symantec and Norton products, including a '100% reliable remote exploit' and a 'wormable' flaw that requires no user interaction by the victim for an attacker to exploit. Read More

Thumbnail Image
Video

How iOS 10 will collect and use your data

Apple believes there shouldn't be a tradeoff between intelligent software and privacy. iOS 10 is the first to incorporate machine learning and artificial intelligence without sacrificing privacy. Watch Now

Thumbnail Image

Resold hard drives on eBay, Craigslist are still ripe with leftover data

Before you throw away that old hard drive, make sure you purge the memory clean. A new study has found that most users are accidentally giving up photos, social security numbers and financial data, by failing to properly delete the files on their recycled hard drives. Read More

Thumbnail Image

Researchers dismantle Iranian cyberespionage operation

The infrastructure used by an Iranian cyberespionage group to control infected computers since 2007 has been hijacked by security researchers. Read More

Thumbnail Image

Mobile ransomware jumps, blocking access to phones

Mobile ransomware is on the rise, with the infection rate skyrocketing, according to new research. Read More

Research/Infographic: Hewlett Packard Enterprise

Cybersecurity Talent: Attract and Retain to Protect Your Business

Do you have trouble finding, hiring, and retaining top cybersecurity talent? You're in good company. According to a survey by MIT Technology Review, 40% of business and IT leaders call "lack of in-house expertise" their biggest information-security challenge. This infographic will be your "Personnel Playbook" for addressing the cybersecurity skills challenge to close the talent gap and secure your future. Read More

Computerworld's 2016 mobile data service satisfaction survey is underway!

Which carrier's users are the most satisfied with their mobile data service? That's what we want to find out. For the fourth year, Computerworld is polling readers to find out how they feel about their mobile data provider, how much they pay, how they use their mobile data connections and more. Take the survey here

June/July Digital Magazine: 100 Best Places to Work in IT

Check out our June/July Digital Magazine, featuring Computerworld's 100 Best Places to Work in IT report, which highlights top organizations across the country that offer technology pros challenging projects, robust salaries and flexible work/life options. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Nominate a leader for the 2017 Premier 100 awards

Computerworld has launched its annual search for 100 technology professionals who have demonstrated leadership in their organizations through the use of technology and have the strategic vision to align technology with business goals. The deadline for nominating a candidate for the Premier 100 Technology Leaders awards is Aug. 31, 2016. Make a nomination today!

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive