Wednesday, September 21, 2016

IT security's looming tipping point

How flexible should your infosec model be?

Email not displaying correctly? View it in your browser.

Computerworld Security Issues and Trends

Sep 21, 2016
Featured Image
INSIDER

IT security's looming tipping point

Even as security draws board-level attention, many IT professionals give their organizations' infosec practices low marks. This special downloadable report from CIO, CSO and Computerworld reveals how to tip the balance in the right direction. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How flexible should your infosec model be?
This tool sends alerts when your data is leaked
TLS 1.3 gets early adoption boost through CloudFlare
Data hoarding site LeakedSource could make hacking easier
Industrial IoT inches toward consensus on security
Crypto backdoors will be nailed shut
Rugged DevOps: Build security into software development
A Defensive Computing term paper on privacy: VPNs, Tor and VPN routers
Remote Safe Mode attack defeats Windows 10 pass-the-hash defenses
The FBI could have saved money with this iPhone 5c hack
Chase Mobile grasps the obvious about biometrics
Review: 5 open-source alternatives for routers/firewalls
Oracle will acquire cloud security vendor Palerra

White Paper: CA Technologies

Addressing PCI Compliance: Through Privileged Access Management

Organizations handling transactions involving credit or debit cards are facing increasing pressure to meet regulatory compliance mandates. In particular, they must comply with the Payment Card Industry Data Security Standard (PCI DSS) version 3, which went into effect in January of 2015.1 PCI DSS v3 established various requirements for safeguarding an organization's relevant systems and networks, comprising the Cardholder Data Environment (CDE). Read More

Thumbnail Image

How flexible should your infosec model be?

Organizations need to stay on top of a fast-shifting threat landscape by updating their security policies -- without badgering users into a state of noncompliance. Read More

Thumbnail Image

This tool sends alerts when your data is leaked

If you're worried that your data might be in the hands of a hacker, one site is offering a free service that can give you a head's up. Read More

Thumbnail Image

TLS 1.3 gets early adoption boost through CloudFlare

Website security and performance vendor CloudFlare has made the newest version of the TLS secure communications protocol available to all of its customers. Read More

Thumbnail Image

Data hoarding site LeakedSource could make hacking easier

A site that's been warning the public about data breaches might actually be doing more harm than good. Read More

Thumbnail Image

Industrial IoT inches toward consensus on security

The Industrial Internet Consortium, a group that includes some of the biggest players in the internet of things, took action on Monday to clear the air around industrial IoT security. Read More

Thumbnail Image

Crypto backdoors will be nailed shut

As we move to a world of hybrid data centers that span both private and public clouds, encryption will become increasingly ubiquitous and important. As such, the integrity of an encryption solution moves more centrally into the spotlight. Read More

Thumbnail Image
INSIDER

Rugged DevOps: Build security into software development

DevOps improved software development and deployment. Rugged DevOps brings together security pros, developers and operations to deliver better application security faster. Read More

Thumbnail Image

A Defensive Computing term paper on privacy: VPNs, Tor and VPN routers

If I was in high school, tasked with a writing a term paper about online privacy, I might hand in homework that compared and contrasted Tor, consumer VPNs and VPN routers. Something much like the following. Read More

Thumbnail Image

Remote Safe Mode attack defeats Windows 10 pass-the-hash defenses

Attackers could remotely force Windows computers into Safe Mode to get around pass-the-hash protections and steal user account credentials. Read More

Thumbnail Image

The FBI could have saved money with this iPhone 5c hack

The FBI may have paid a small fortune to unlock an iPhone 5c used by the San Bernardino shooter. But a security researcher has demonstrated a way to do it for less than $100. Read More

Thumbnail Image

Chase Mobile grasps the obvious about biometrics

Chase has quietly stopped asking for passwords for sensitive transfers on its mobile app, concluding that a fingerprint-scan is quite sufficient. Read More

Thumbnail Image
INSIDER

Review: 5 open-source alternatives for routers/firewalls

These open-source products deliver simple routing and networking features, like DHCP and DNS. Plus, they have security functionality, starting with a basic firewall and possibly including antivirus, antispam and Web filtering. Read More

Thumbnail Image

Oracle will acquire cloud security vendor Palerra

Oracle has agreed to acquire Palerra, a vendor of software for securing cloud services, as part of a strategy to provide customers comprehensive identity and security cloud services. Read More

Video/Webcast: Anomali

Addressing the New Threat Intelligence Problems of Scale and Relevance

Threat intelligence and threat intelligence platforms have become must-haves for large organizations. From large enterprises to government agencies, it is important to understand what threat actors are doing, review threat intelligence and collect indicators of compromise. However, threat intelligence itself has become a big data problem and the number of active indicators of compromise has grown into the tens of millions. Read More

Take Computerworld's 2017 IT Salary Survey

Computerworld's annual salary survey shines a bright light on IT compensation. The more respondents we get, the better our results will be. Survey participants can enter a drawing to win 1 of 3 American Express gift cards for $500 each! The drawing is open to legal U.S. residents, age 18 or older. Take our 2017 IT Salary Survey today! Take the survey here

Call for Entries: The 2017 Digital Edge 25 Awards

Computerworld and CIO are excited to announce that the 2017 Digital Edge awards are now open! With new categories such as AI, IoT and overall implementation of a digital strategy, the Digital Edge 25 is your chance to win recognition for your company and your team for your digital innovation. Submit Now Take the survey here

September Digital Magazine: 2016 Data+ Editors' Choice Awards

Check out our September Digital Magazine, featuring the 2016 Data+ Editors' Choice honorees — organizations using clear-eyed analytics to achieve a wide spectrum of gains. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security Issues and Trends as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive