|
Video/Webcast: HP Inc. Security threats are evolving every day. Even one security breach has the potential to be costly. If private information is jeopardized due to unsecured printing, the ramifications can be numerous. Join this webinar, brought to you by HP Inc., to learn how to protect your print environment from security breaches. Get your questions answered in the live Q&A session at the end of the webinar. Read More ▶ |
CEOs, board members need to bone up on cybersecurity and not leave those matters to CIOs, analyst says Read More ▶ | |
Insecure default configurations are prevalent in the IoT world, but many of them could be easily avoided if device manufacturers would include LAN-based attacks in their threat modelling. Read More ▶ | |
|
In the recent Netgear router flaw, its easy to blame Netgear for ignoring the initial report of the vulnerability. They have since admitted that it fell through the cracks. But there appears to be plenty of blame to go around. Read More ▶ | |
There are enough quality gratis cyber security tools among the differing security product categories to make this free tool treasure hunt worth your while. Read More ▶ | |
Apple has backtracked on a plan to force iOS developers to encrypt their app communications by the end of the year. Read More ▶ | |
Visitors to the U.S. under a visa waiver program are being asked by the Department of Homeland Security for information about their social media accounts, a plan that has drawn criticism from civil rights groups for its potential encroachment on privacy. Read More ▶ | |
Here's how to get more from your stretched security budget. Read More ▶ | |
Developers of the popular Signal secure messaging app have started to use Google's domain as a front to hide traffic to their service and to sidestep blocking attempts. Read More ▶ | |
IT pilot fish gets a call from his company's security manager at a few minutes before midnight: The front-desk security guard's phone is completely dead. Read More ▶ | |
The Electronic Frontier Foundation is advising the tech sector to use end-to-end encryption for every transaction by default, and to scrub logs. Read More ▶ | |
For this review, we tested threat-hunting systems from Sqrrl, Endgame and Infocyte. Each program was tested in a large demo environment seeded with realistic APT threats which had bypassed perimeter defenses and were hiding somewhere within the network of virtualized clients and servers. Read More ▶ | |
White Paper: MicroStrategy In this paper, we highlight seven frequently overlooked charts and graphs that help analysts convey information more efficiently. With these unique data visualizations, you can: - Present information in an intuitive and compelling way - Uncover hidden insights with interactive slicing and dicing - Enable quick cross-departmental decision-making - Make data accessible and understandable to more users across the organization Read More ▶ |
This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here ▶ |
Computerworld is seeking to identify the 100 top workplaces for IT professionals for our 24th annual Best Places to Work in IT list. We invite Computerworld readers, HR and PR professionals and other interested parties to nominate organizations, in any industry, that they think are providing great working environments for IT employees, including challenging work, fair pay and ample training opportunities. Nominate a company now through Dec. 28, 2016. Make your nomination here ▶ |
Check out the December Digital Magazine, featuring our Tech Forecast 2017 special report, which outlines the top priorities in hiring, spending and projects for IT leaders. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here ▶ |
Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now ▶ |
Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now ▶ |
Search multiple listings now and get new job alerts as they are posted. Check them out now ▶ |
0 comments:
Post a Comment