Wednesday, October 5, 2016

Navigating the muddy waters of enterprise infosec

Dell EMC patches critical flaws in VMAX enterprise storage systems

Email not displaying correctly? View it in your browser.

Computerworld Security Issues and Trends

Oct 05, 2016
Featured Image
INSIDER

Navigating the muddy waters of enterprise infosec

Information security finally has executives' attention, but aligning with business needs is still challenging. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Dell EMC patches critical flaws in VMAX enterprise storage systems
IoT botnet highlights the dangers of default passwords
IBM's IoT blockchain service gets ready to roll
Meet Apache Spot, a new open-source project for cybersecurity
A nudge from ransomware
Ransomware spreads through weak remote desktop credentials
Here's how Microsoft is using containerization to protect Edge users
Investigating Cybersecurity Incidents — a free course
Android malware that can infiltrate corporate networks is spreading
Your users have porous passwords? Blame yourself, IT.
How NOT to manage passwords
The changing data protection paradigm
Teleporting a photon leads researchers to quantum security

eBook: Kony Inc

3 Must-Read Mobile Innovation Stories

Today, the world runs on mobile-time. The speed, access and connectivity to conduct business on any device, anywhere is an enterprise-wide opportunity. Read More

Thumbnail Image

Dell EMC patches critical flaws in VMAX enterprise storage systems

Dell EMC has fixed six flaws in its management interfaces for VMAX enterprise storage systems, including three vulnerabilities that are rated critical and could lead to the exposure of files or complete system compromise. Read More

Thumbnail Image

IoT botnet highlights the dangers of default passwords

A botnet responsible for a massive DDOS (distributed denial-of-service) attack was created thanks to weak default usernames and passwords found in internet-connected cameras and DVRs. Read More

Thumbnail Image

IBM's IoT blockchain service gets ready to roll

A massive DDOS attack and weaknesses in critical systems have put security concerns front and center in the internet of things. IBM thinks blockchain technology could lock down at least one use of IoT. Read More

Thumbnail Image

Meet Apache Spot, a new open-source project for cybersecurity

Cloudera and Intel on Wednesday announced that they've donated a new open-source project to the Apache Software Foundation that's focused on using big data analytics and machine learning for cybersecurity. Read More

Thumbnail Image

A nudge from ransomware

Our manager needs to get remote users' PCs backed up without forcing them to connect to the network, which they rarely have to do these days to do their jobs. Read More

Thumbnail Image

Ransomware spreads through weak remote desktop credentials

Stolen or weak remote desktop credentials are routinely used to infect point-of-sale systems with malware, but recently they've also become a common distribution method for crypto-ransomware. Read More

Thumbnail Image

Here's how Microsoft is using containerization to protect Edge users

Microsoft is aiming to better protect users and organizations from the threats that they face in the browser with a new feature called Windows Defender Application Guard. It's designed to isolate Microsoft Edge from the rest of the files and processes running on a user's computer and prevent computer exploits from taking hold. Read More

Thumbnail Image
INSIDER

Investigating Cybersecurity Incidents — a free course

Training provider Logical Operations offers a free online course on how to collect, preserve and analyze evidence from cybersecurity incidents — and prepare for the court case. Read More

Thumbnail Image

Android malware that can infiltrate corporate networks is spreading

An Android Trojan is spreading across app stores, including Google Play, and has the capability of stealing sensitive files from corporate networks. Read More

Thumbnail Image

Your users have porous passwords? Blame yourself, IT.

Your efforts at raising security awareness could be making users feel that it's pointless to try to protect themselves. Read More

Thumbnail Image

How NOT to manage passwords

Managing password resets without making headlines Read More

Thumbnail Image

The changing data protection paradigm

In just a few years, the industry has experienced a data paradigm shift. Most organizations now must deal with massive amounts of incoming data, in various forms, ranging from structured information in the form of databases and lists to unstructured data -- including documents, images, even cat pictures. Protecting all of this data can be quite intimidating. Despite the challenge, however, it is important to start somewhere, which requires that you know what data you have, and where it is. Read More

Thumbnail Image

Teleporting a photon leads researchers to quantum security

It's still early days, but teleporting photons could lead to unbreakable security; tampering with photons creates obvious changes in code keys. Read More

White Paper: AppNeta

3 Reasons Why Network Ops Needs to Focus on Application Performance

IT/Network Ops teams need to build out an application performance team to measure and monitor the end-user experience of the business critical apps these organizations use every day. Read More

Take Computerworld's 2017 IT Salary Survey

Computerworld's annual salary survey shines a bright light on IT compensation. The more respondents we get, the better our results will be. Survey participants can enter a drawing to win 1 of 3 American Express gift cards for $500 each! The drawing is open to legal U.S. residents, age 18 or older. Take our 2017 IT Salary Survey today! Take the survey here

Call for Entries: The 2017 Digital Edge 25 Awards

Computerworld and CIO are excited to announce that the 2017 Digital Edge awards are now open! With new categories such as AI, IoT and overall implementation of a digital strategy, the Digital Edge 25 is your chance to win recognition for your company and your team for your digital innovation. Submit Now Take the survey here

September Digital Magazine: 2016 Data+ Editors' Choice Awards

Check out our September Digital Magazine, featuring the 2016 Data+ Editors' Choice honorees — organizations using clear-eyed analytics to achieve a wide spectrum of gains. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security Issues and Trends as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive