Wednesday, August 3, 2016

Wearables could compromise corporate data

Russia says spies planted malware on critical infrastructure

Email not displaying correctly? View it in your browser.

Computerworld Security Issues and Trends

Aug 03, 2016
Featured Image

Wearables could compromise corporate data

Smartwatches, fitness trackers and other wearable devices that are connected to corporate Wi-Fi networks could lead to serious privacy and security issues, experts say. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Russia says spies planted malware on critical infrastructure
Schneier: Next president may face IoT cyberattack that causes people to die
Use Tor? Riffle promises to protect your privacy even better
Cyberespionage group sets its sights on multiple industries
Defective products could result from cyberattacks on industrial 3D printers
Feds to hire 3,500 cybersecurity pros by year's end
So, you bought good security tools. Now what?
Salesforce expands encryption options with 'bring your own key'
Cybersecurity firms step up intel sharing despite issues of trust
Google hopes to thwart quantum computers from cracking internet encryption
EU plans $2B investment in cybersecurity research
Study reveals security gap in big data projects

White Paper: Fastly

Accelerate Your Media Business with Edge Computing

In today's online publishing world, readers expect a fast, personalized experiences across multiple devices or they'll go elsewhere. At the same time, technologies like ad blockers and bots are changing the economics of digital publishing. Find out why a growing number of online publishers are turning to edge computing to help address these challenges, while also improving their readers' experiences and reducing costs. Read More

Thumbnail Image

Russia says spies planted malware on critical infrastructure

Russian military networks and other critical infrastructure have been hit by tailor-made malware, according to government officials. Read More

Thumbnail Image

Schneier: Next president may face IoT cyberattack that causes people to die

With IoT and cyber-physical systems becoming the new normal, respected security guru Bruce Schneier suggested the next president may face 'a large-scale internet disaster that kills multiple people.' Read More

Thumbnail Image

Use Tor? Riffle promises to protect your privacy even better

Privacy-minded people have long relied on Tor for anonymity online, but a new system from MIT promises better protection and faster performance. Read More

Thumbnail Image

Cyberespionage group sets its sights on multiple industries

A cyberespionage group known for targeting diplomatic and governmental institutions has branched out into many other industries, including aviation, broadcasting and finance, researchers warn. Read More

Thumbnail Image

Defective products could result from cyberattacks on industrial 3D printers

With the growth of Internet-connected 3D printers, researchers say there's a threat of hackers tweaking manufacturing specifications and introducing defects that affect the reliability of parts for numerous industries. Read More

Thumbnail Image

Feds to hire 3,500 cybersecurity pros by year's end

The U.S. government is trying to improve the recruiting and retention of cybersecurity professionals. Read More

Thumbnail Image

So, you bought good security tools. Now what?

The pace of growth in the availability of information security tools in the last five years has been nothing short of astounding, but many organizations get very little for their money. Here are the steps necessary to make these security tools truly useful. Read More

Thumbnail Image

Salesforce expands encryption options with 'bring your own key'

Salesforce on Tuesday stepped up its efforts to woo security-conscious businesses by adding "bring your own key" encryption to its Salesforce Shield set of cloud services. Read More

Thumbnail Image

Cybersecurity firms step up intel sharing despite issues of trust

To keep hackers at bay, more security vendors have been trying to foster cooperation, and share data on the latest threats – even as it might spark concerns over trust and competition. Read More

Thumbnail Image

Google hopes to thwart quantum computers from cracking internet encryption

The encryption methods used to secure today's internet won't be impenetrable forever. More powerful "quantum computers" in the future could very well crack them. Read More

Thumbnail Image

EU plans $2B investment in cybersecurity research

The European Union is putting up $500 million to fund research into cybersecurity and wants industry to contribute three times that. Read More

Thumbnail Image
INSIDER

Study reveals security gap in big data projects

An IDG Enterprise study of big-data initiatives finds that the extremely valuable output of those projects often lacks additional security. Download the free report. Read More

White Paper: Fastly

Cache eCommerce APIs to Optimize Web and Mobile Performance

While APIs enable a more dynamic online shopping experience, performance is often a challenge. As a modern CDN, Fastly can cache API responses to optimize your web store performance, deliver a more personalized shopping experience, and dramatically reduce infrastructure costs without replacing legacy solutions. Read More

Take our brief survey about ad blockers

Truthfully now, do you use an ad blocker? Take our brief survey and tell us why.

Computerworld's 2016 mobile data service satisfaction survey is underway!

Which carrier's users are the most satisfied with their mobile data service? That's what we want to find out. For the fourth year, Computerworld is polling readers to find out how they feel about their mobile data provider, how much they pay, how they use their mobile data connections and more. Take the survey here

August Digital Magazine: Bridging IT's Growing Generation Gap

Check out our August Digital Magazine, featuring an in-depth look at IT's growing generation gap, how legacy systems can help fund innovation and how IT leaders are scaling their analytics infrastructures to back up business-critical decisions. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Nominate a leader for the 2017 Premier 100 awards

Computerworld has launched its annual search for 100 technology professionals who have demonstrated leadership in their organizations through the use of technology and have the strategic vision to align technology with business goals. The deadline for nominating a candidate for the Premier 100 Technology Leaders awards is Aug. 31, 2016. Make a nomination today!

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security Issues and Trends as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive