Wednesday, June 1, 2016

Printer security: Is your company's data really safe?

Crying 'Wolf!' seems to work for security

Email not displaying correctly? View it in your browser.

Computerworld Security Issues and Trends

Jun 01, 2016
Featured Image
INSIDER

Printer security: Is your company's data really safe?

IT managers have found that printers can pose major cybersecurity risks --assuming they pay any attention to them at all. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Crying 'Wolf!' seems to work for security
Review: New tools to fight insider threats
WordPress plug-in flaw puts over 1M websites at risk
New JavaScript spam wave distributes Locky ransomware
Are you buried under your security data?
IoT security is getting its own crash tests
Senate proposal to require encryption workarounds may be dead
Top-level domain expansion is a security risk for business computers
Do we need vendor allies in the malware arms race?
Faception can allegedly tell if you're a terrorist just by analyzing your face
Privacy Shield needs improvement, says EU privacy watchdog

White Paper: Level 3 Communications

5 Signs Your Cloud Connection Is Mission-Critical Ready

Is your cloud connection "mission-critical" ready? It all depends on the types of applications you're running in the cloud, and how important they are to the productivity of your people and the success of your business. Public, private or hybrid, there's a lot to know, but where do you start? Read More

Thumbnail Image

Crying 'Wolf!' seems to work for security

Breaches that weren't have gotten a lot of attention — and that's not such a bad thing. Read More

Thumbnail Image
INSIDER

Review: New tools to fight insider threats

An entire industry has sprung up to provide a defense against insider threats. We tested products from Fortscale, Avanan, and PFU Systems, with each one concentrating on a different aspect of the problem. Read More

Thumbnail Image

WordPress plug-in flaw puts over 1M websites at risk

Owners of WordPress-based websites should update the Jetpack plug-in as soon as possible because of a serious flaw that could expose their users to attacks. Read More

Thumbnail Image

New JavaScript spam wave distributes Locky ransomware

Over the past week, computers throughout Europe have been hit by a massive email spam campaign carrying malicious JavaScript attachments that install the Locky ransomware program. Read More

Thumbnail Image

Are you buried under your security data?

I am skeptical about the whole idea of threat intelligence sharing. The big problem, is not the lack of information, but rather the ability to process and act on it. If we cannot use our own data to advantage, why would we expect to be able to use one or more threat intelligence feeds? Read More

Thumbnail Image

IoT security is getting its own crash tests

The thousands of endpoints in IoT systems may have to protect themselves against thousands of dangers. A decades-old IT lab wants to tell you if those systems are up to the task. Read More

Thumbnail Image

Senate proposal to require encryption workarounds may be dead

A proposal in the U.S. Senate to require smartphone OS developers and other tech vendors to break their own encryption at the request of law enforcement may be dead on arrival. Read More

Thumbnail Image

Top-level domain expansion is a security risk for business computers

The explosion of new generic top-level domains (gTLDs) in recent years can put enterprise computers at risk due to name conflicts between domain names used inside corporate networks and domains that can now be registered on the public Internet. Read More

Thumbnail Image

Do we need vendor allies in the malware arms race?

The complexity of today's SOC functions means you probably can't hire and keep a staff with all the necessary training. Read More

Thumbnail Image

Faception can allegedly tell if you're a terrorist just by analyzing your face

Faception claims it can spot if you are a terrorist, pedophile, genius or some other personality – judging a book by its cover with an 80% accuracy, by just analyzing your face. An unnamed homeland security inked a contract with the pre-crime-like tech startup. Read More

Thumbnail Image

Privacy Shield needs improvement, says EU privacy watchdog

Privacy Shield has a new detractor, and that spells bad news for businesses built on the transatlantic transfer of personal data. Read More

Video/Webcast: Google Apps for Work

Atmosphere Digital: Rethinking Security in the Cloud

Now you can experience the ease and flexibility of open, collaborative tools while gaining better protection for your data. In this live event brought to you by Google Apps for Work, learn from Google security experts and customers as they share their vision for a safer Internet and discover how Google's innovative security technology meets the unique challenges of working and living in the cloud. Read More

May Digital Magazine: Cross-border data blues

Check out our May Digital Magazine, featuring an in-depth story on the EU's new data protection regulations and the pressure on IT teams to achieve compliance. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Nominate a leader for the 2017 Premier 100 awards

Computerworld has launched its annual search for 100 technology professionals who have demonstrated leadership in their organizations through the use of technology and have the strategic vision to align technology with business goals. The deadline for nominating a candidate for the Premier 100 Technology Leaders awards is Aug. 31, 2016. Make a nomination today!

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security Issues and Trends as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive