|
White Paper: Symantec Cyber criminals grow more professional and devious every day. You face relentless sophisticated attacks, targeting information vital to your safety and brand. When you're stretched defending against both targeted and random threats, you'll lose focus and steal resources from the rest of your business. Read More ▶ |
Future versions of Android will be more resilient to exploits thanks to developers' efforts to integrate the latest Linux kernel defenses into the operating system. Read More ▶ | |
Microsoft will start enforcing a change in minimum hardware requirement for Windows 10 PCs and mobile devices, and expects hardware makers to comply. Read More ▶ | |
Donald Trump's muddled stance on hacking has disturbed security experts at time when the tech industry is looking for clarity on U.S. cyber policy. Read More ▶ | |
|
Security researchers have shut down a large-scale malvertising operation that used sophisticated techniques to remain undetected for months and served exploits to millions of computers. Read More ▶ | |
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with Ted Harrington of Independent Security Evaluators about how different generations (mainly millennials and Baby Boomers) view both security and privacy matters. These differences and attitudes can have a big effect on how companies train them on proper security procedures. Watch Now ▶ | |
The FBI is said to be investigating yet another suspected hack of a Democratic Party organization, this time of the Democratic Congressional Campaign Committee that raises funds for Democrats running for the House of Representatives. Read More ▶ | |
Former National Security Agency contractor Edward Snowden has censured WikiLeaks' release of information without proper curation. Read More ▶ | |
White Paper: Symantec Your endpoint protection does a good job of blocking threats. But it simply isn't enough. In 2015, Symantec discovered roughly one million new pieces of malware each day-and these stealthier, more complex targeted attacks continue to evolve. To stay ahead of advanced attacks, you must go beyond threat prevention to include threat detection and response. Read More ▶ |
Truthfully now, do you use an ad blocker? Take our brief survey and tell us why. ▶ |
Which carrier's users are the most satisfied with their mobile data service? That's what we want to find out. For the fourth year, Computerworld is polling readers to find out how they feel about their mobile data provider, how much they pay, how they use their mobile data connections and more. Take the survey here ▶ |
Check out our June/July Digital Magazine, featuring Computerworld's 100 Best Places to Work in IT report, which highlights top organizations across the country that offer technology pros challenging projects, robust salaries and flexible work/life options. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here ▶ |
Computerworld has launched its annual search for 100 technology professionals who have demonstrated leadership in their organizations through the use of technology and have the strategic vision to align technology with business goals. The deadline for nominating a candidate for the Premier 100 Technology Leaders awards is Aug. 31, 2016. Make a nomination today! ▶ |
Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now ▶ |
Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now ▶ |
Search multiple listings now and get new job alerts as they are posted. Check them out now ▶ |
0 comments:
Post a Comment