Monday, August 1, 2016

Game of Thrones can teach valuable security lessons

7 security lessons from Game of Thrones

Email not displaying correctly? View it in your browser.

Computerworld Security

Aug 01, 2016
Featured Image

Game of Thrones can teach valuable security lessons

With new hacking techniques, malware, viruses and threats being created faster than Melisandre's demon babies, the web is indeed dark and full of terrors. Here are seven lessons for security managers pulled straight out of Westeros. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

7 security lessons from Game of Thrones
Black Hat conference trims insecure features from its mobile app
Android Trojan SpyNote leaks on underground forums
SwiftKey's typing predictions may have leaked users' emails

White Paper: Insight

Managing and Securing Enterprise Mobility

Mobility brings a unique set of challenges for large enterprises. Learn the best practices for implementing a successful enterprise mobility management plan and keeping your company data secure. Read More

Thumbnail Image

7 security lessons from Game of Thrones

With new hacking techniques, malware, viruses and threats being created faster than Melisandre's demon babies, the web is indeed dark and full of terrors. Here are seven lessons for security managers pulled straight out of Westeros. Read More

Black Hat conference trims insecure features from its mobile app

Black Hat has disabled features of its mobile application because attackers could have logged in as legitimate attendees, posted messages in their names and spied on the messages they sent. Read More

Thumbnail Image

Android Trojan SpyNote leaks on underground forums

A new and potent Android Trojan has been leaked on several underground forums, making it available for free to less resourceful cybercriminals who are now likely to use it in attacks. Read More

Thumbnail Image

SwiftKey's typing predictions may have leaked users' emails

SwiftKey, a popular keyboard app, has suspended a syncing feature that may have leaked users' emails to strangers. Read More

White Paper: AT&T / AT&T Wireless

The Best Of Both Worlds: Easy Internet Access With Highly Secure Connections

Your business locations have varying needs in how they connect to your private network. AT&T Multiservice VPN gives you flexibility, as well as an intuitive portal to manage your public and private networks at an affordable price. It allows you to easily connect your remote locations to applications and sensitive information. Read More

Take our brief survey about ad blockers

Truthfully now, do you use an ad blocker? Take our brief survey and tell us why.

Computerworld's 2016 mobile data service satisfaction survey is underway!

Which carrier's users are the most satisfied with their mobile data service? That's what we want to find out. For the fourth year, Computerworld is polling readers to find out how they feel about their mobile data provider, how much they pay, how they use their mobile data connections and more. Take the survey here

June/July Digital Magazine: 100 Best Places to Work in IT

Check out our June/July Digital Magazine, featuring Computerworld's 100 Best Places to Work in IT report, which highlights top organizations across the country that offer technology pros challenging projects, robust salaries and flexible work/life options. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Nominate a leader for the 2017 Premier 100 awards

Computerworld has launched its annual search for 100 technology professionals who have demonstrated leadership in their organizations through the use of technology and have the strategic vision to align technology with business goals. The deadline for nominating a candidate for the Premier 100 Technology Leaders awards is Aug. 31, 2016. Make a nomination today!

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive