|
Video/Webcast: 1E In this webinar, 1E Technology Architect Mike Terrill and TrueSec Senior consultant Mikael Nystrom discuss expert tips on migrating to Windows 10 in the most secure way. This can be done using 1E's unique technology to automate the switch from BIOS to UEFI. Read More ▶ |
Disclosure of NSA zero days signals a need for clear policies on when to notify affected vendors. Read More ▶ | |
Fear of leaky organizations storing personal biometric data might be behind the public's preference for passwords over biometry for security. Read More ▶ | |
A suspect in the recent data breach at Sage, a U.K. provider of business software, has been arrested. On Wednesday, police in London detained a company employee. Read More ▶ | |
|
Two high-profile airline technology meltdowns stranding thousands of travelers in the past couple weeks have prompted two US senators to push carriers to bolster their technology. Senators Richard Blumenthal (D-Conn.) and Edward J. Markey (D-Mass.)this week sent a letter to the most recent offenders -- Delta and Southwest -- as well as 11 other airlines to get a better handle on whether or not their information technology systems are reliable and resilient. Read More ▶ | |
It's long been known that secret messages can be included in music through techniques such as backmasking, but now a Polish researcher has developed an entirely new approach. Read More ▶ | |
It has been over six years that the government set the America Competes Act which in combination with Challenge.gov has prompted more than 700 public-sector prize competitions that have doled out more than $80 million in prizes. Read More ▶ | |
"With alarming frequency, ransomware hackers are sneaking into consumer and business computers, encrypting files containing photos, documents and other important data, and then demanding a ransom in exchange for the key needed to decrypt the files. Consumers, businesses, and government agencies are falling prey to these schemes, including hospitals whose servers may contain sensitive patient data. Read More ▶ | |
Cisco's security intelligence and research group Talos, said that it had reported a serious vulnerability in Rockwell Automation's industrial control system – the MicroLogix 1400 programmable logic controller (PLC). The Simple Network Management Protocol exploit could let an attacker take complete remote control of the MicroLogix system and modify the device firmware, letting an invader run his own malicious code on the device. Read More ▶ | |
White Paper: 1E This exclusive 1E White Paper will give you a detailed answer to the following questions -What is Device Guard designed to achieve? -What does Device Guard do and how does it do it? -What are the risks of not using Device Guard? -How should you implement Device Guard? Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS Back to school stuff for the discerning techie (or techie-in-training) Read More ▶ |
Most-Read Stories |
0 comments:
Post a Comment