|
White Paper: Rsam As enterprises continue to outsource more aspects of their operations to third parties, they expose themselves to more shared risk. It can be a staggering responsibility. Most organizations understand the need to automate vendor risk management activities to keep up with increasing scope and scrutiny. Yet they struggle to identify and prioritize the key features their VRM solution must provide so they can make a significant impact quickly. Read More ▶ |
Malware that can build botnets out of IoT devices was at least partly responsible for a massive distributed denial-of-service attack that disrupted U.S. internet traffic on Friday, according to network security companies. Read More ▶ | |
A Chinese electronics component manufacturer says its products inadvertently played a role in a massive cyberattack that disrupted major internet sites in the U.S. on Friday. Read More ▶ | |
|
Marketing companies are targeting children worldwide on YouTube with advertising disguised as other content, an "unfair and deceptive" business practice, three privacy groups said in a complaint to the U.S. Federal Trade Commission. Read More ▶ | |
Some of the biggest names on the internet – including Twitter, GitHub, Etsy, Spotify, the New York Times and the Boston Globe, among many others – were temporarily knocked offline by a DDoS attack that targeted DNS provider Dyn early Friday morning. Read More ▶ | |
Attacks against DNS service provider Dyn resumed after a two-and-a-half hour lull, and could indicate a new application of an old criminal technology, experts say. Read More ▶ | |
The U.S. has charged a suspected Russian hacker with stealing information from LinkedIn, Dropbox and a question-and-answer site formerly known as Formspring. Read More ▶ | |
Intel does not object to John McAfee using his personal name in connection with his business, but it objects to the use by the entrepreneur and security expert of the McAfee trade name and trademark in a way that could confuse or deceive consumers or dilute the brand. Read More ▶ | |
White Paper: Keeper Security This whitepaper discusses the emergence of the password as the primary authentication method in today's digital world and educates readers on authentication techniques, methodologies, technologies and best practices. Read More ▶ |
Computerworld's annual salary survey shines a bright light on IT compensation. The more respondents we get, the better our results will be. Survey participants can enter a drawing to win 1 of 3 American Express gift cards for $500 each! The drawing is open to legal U.S. residents, age 18 or older. Take our 2017 IT Salary Survey today! Take the survey here ▶ |
Computerworld and CIO are excited to announce that the 2017 Digital Edge awards are now open! With new categories such as AI, IoT and overall implementation of a digital strategy, the Digital Edge 25 is your chance to win recognition for your company and your team for your digital innovation. Submit Now Take the survey here ▶ |
Check out our October Digital Magazine, featuring an in-depth look at how bots are poised to either liberate IT from mundane tasks or add to IT's workload. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here ▶ |
Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now ▶ |
Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now ▶ |
Search multiple listings now and get new job alerts as they are posted. Check them out now ▶ |
0 comments:
Post a Comment