|
White Paper: Symantec In the world of endpoint security and antivirus, there is a need to shift away from using signatures as the primary method for malware prevention. No less than 37 new endpoint security products have emerged in the past five years, each claimed to address the changing landscape. But how do you know who to use, when to use them and if it will be enough to protect your enterprise? Read More ▶ |
Microsoft's lawsuit objecting to the indiscriminate use by U.S. law enforcement of orders that demand user data without the opportunity to inform the customer may run into questions about the software giant's standing to raise the issue on behalf of its customers. Read More ▶ | |
Over the past two years, Google has convinced developers to patch security issues in over 275,000 Android apps hosted on its official app store. Read More ▶ | |
|
The creators of encrypted email service ProtonMail have set up a server that's only accessible over the Tor anonymity network as a way to fight possible censorship attempts in some countries. Read More ▶ | |
Spanish police have arrested a suspected Russian hacker of developing the Neverquest banking Trojan, a malware targeting financial institutions across the world. Read More ▶ | |
Steven Mnuchin, a former CIO and executive vice president for Goldman Sachs, told senators on Thursday that he is "very concerned about the lack of first-rate technology at the IRS" as well as staff cuts in recent years. Read More ▶ | |
The developer behind Lavabit, an email service that noted leaker Edward Snowden used, is releasing source code for an open-source, end-to-end encrypted email standard that promises surveillance-proof messaging. Read More ▶ | |
WikiLeaks founder Julian Assange said he stands by an earlier pledge to face trial in the U.S., but he is first urging federal investigators to name the exact charges against him. Read More ▶ | |
White Paper: Symantec Although they are only part of an effective strategy, enterprises need to ensure they have the right endpoint security solution in place to keep both valued data and users secure. Read this edition of Radicati Market Quadrants as it covers endpoint security and explores top vendors, vendors disrupting the market as well as emerging players organizations should look out for. Read More ▶ |
This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here ▶ |
Check out the December Digital Magazine, featuring our Tech Forecast 2017 special report, which outlines the top priorities in hiring, spending and projects for IT leaders. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here ▶ |
Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now ▶ |
Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now ▶ |
Search multiple listings now and get new job alerts as they are posted. Check them out now ▶ |
0 comments:
Post a Comment