Wednesday, January 4, 2017

A potentially fatal blow against patent trolls

Corporate boards aren't prepared for cyberattacks

Email not displaying correctly? View it in your browser.

Computerworld Security Issues and Trends

Jan 04, 2017
Featured Image

A potentially fatal blow against patent trolls

If law firms think they may be forced to pay defendants' enormous legal bills, it could undermine the entire business model of patent trolls. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Corporate boards aren't prepared for cyberattacks
New year's resolution for IoT vendors: Treat LANs as hostile
The Netgear router flaw post mortem -- plenty of blame to go around
Free tools for your cyber-security efforts
Apple gives iOS app developers more time to encrypt communications
U.S. collects social media handles from select visitors
How to get more from your security budget
Encrypted messaging app Signal uses Google to bypass censorship
At least this call didn't come in at 4 a.m.
Silicon Valley's Trump rebellion now has EFF calling for more encryption
Review: Threat hunting turns the tables on attackers

Video/Webcast: HP Inc.

6 of 10 Companies Have Unsecured Printers. How About Yours?

Security threats are evolving every day. Even one security breach has the potential to be costly. If private information is jeopardized due to unsecured printing, the ramifications can be numerous. Join this webinar, brought to you by HP Inc., to learn how to protect your print environment from security breaches. Get your questions answered in the live Q&A session at the end of the webinar. Read More

Thumbnail Image

Corporate boards aren't prepared for cyberattacks

CEOs, board members need to bone up on cybersecurity and not leave those matters to CIOs, analyst says Read More

Thumbnail Image

New year's resolution for IoT vendors: Treat LANs as hostile

Insecure default configurations are prevalent in the IoT world, but many of them could be easily avoided if device manufacturers would include LAN-based attacks in their threat modelling. Read More

The Netgear router flaw post mortem -- plenty of blame to go around

In the recent Netgear router flaw, its easy to blame Netgear for ignoring the initial report of the vulnerability. They have since admitted that it fell through the cracks. But there appears to be plenty of blame to go around. Read More

Thumbnail Image
INSIDER

Free tools for your cyber-security efforts

There are enough quality gratis cyber security tools among the differing security product categories to make this free tool treasure hunt worth your while. Read More

Thumbnail Image

Apple gives iOS app developers more time to encrypt communications

Apple has backtracked on a plan to force iOS developers to encrypt their app communications by the end of the year. Read More

Thumbnail Image

U.S. collects social media handles from select visitors

Visitors to the U.S. under a visa waiver program are being asked by the Department of Homeland Security for information about their social media accounts, a plan that has drawn criticism from civil rights groups for its potential encroachment on privacy. Read More

Thumbnail Image
INSIDER

How to get more from your security budget

Here's how to get more from your stretched security budget. Read More

Thumbnail Image

Encrypted messaging app Signal uses Google to bypass censorship

Developers of the popular Signal secure messaging app have started to use Google's domain as a front to hide traffic to their service and to sidestep blocking attempts. Read More

At least this call didn't come in at 4 a.m.

IT pilot fish gets a call from his company's security manager at a few minutes before midnight: The front-desk security guard's phone is completely dead. Read More

Thumbnail Image

Silicon Valley's Trump rebellion now has EFF calling for more encryption

The Electronic Frontier Foundation is advising the tech sector to use end-to-end encryption for every transaction by default, and to scrub logs. Read More

Thumbnail Image
INSIDER

Review: Threat hunting turns the tables on attackers

For this review, we tested threat-hunting systems from Sqrrl, Endgame and Infocyte. Each program was tested in a large demo environment seeded with realistic APT threats which had bypassed perimeter defenses and were hiding somewhere within the network of virtualized clients and servers. Read More

White Paper: MicroStrategy

7 Data Visualizations You're Not Using Enough

In this paper, we highlight seven frequently overlooked charts and graphs that help analysts convey information more efficiently. With these unique data visualizations, you can:
- Present information in an intuitive and compelling way
- Uncover hidden insights with interactive slicing and dicing
- Enable quick cross-departmental decision-making
- Make data accessible and understandable to more users across the organization Read More

Ready for action: 6 big ideas in digital transformation

This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here

Is your company a best place to work?

Computerworld is seeking to identify the 100 top workplaces for IT professionals for our 24th annual Best Places to Work in IT list. We invite Computerworld readers, HR and PR professionals and other interested parties to nominate organizations, in any industry, that they think are providing great working environments for IT employees, including challenging work, fair pay and ample training opportunities. Nominate a company now through Dec. 28, 2016. Make your nomination here

December Digital Magazine: 2017 Tech Forecast

Check out the December Digital Magazine, featuring our Tech Forecast 2017 special report, which outlines the top priorities in hiring, spending and projects for IT leaders. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security Issues and Trends as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive