Wednesday, February 1, 2017

Trump stresses cybersecurity but postpones executive order

Questions to ask your recovery vendor before you buy

Email not displaying correctly? View it in your browser.

Computerworld Security

Feb 01, 2017
Featured Image

Trump stresses cybersecurity but postpones executive order

U.S. President Donald Trump called on government agencies to better protect their networks, but he delayed signing an executive order to kick-start a government-wide review of cybersecurity policy. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Questions to ask your recovery vendor before you buy
How most hackers get into systems
iPads 'more secure than voting systems' -- claim
Managing risk by understanding attack surfaces
Easy-to-exploit authentication bypass flaw puts Netgear routers at risk
Facebook looks to revamp password recovery by supplanting email

eBook: Bitsight Technologies

Creating Efficiencies In Vendor Risk Management

Today, organizations are focused heavily on core competencies and keys to success. This - coupled with the rapid growth of software as a service (SaaS) - has led to increased outsourcing of certain business functions to vendors who can perform these functions better, faster, or cheaper. Therefore, there are more third-party relationships today than ever before - and this comes with a variety of benefits and consequences. Read More

Thumbnail Image
Video

Questions to ask your recovery vendor before you buy

At ShmooCon 2017, CSO's Steve Ragan chats with Marc Langer, president of Recovery Point, about the questions that many companies often miss when choosing a data recovery system or process. Watch Now

Thumbnail Image
Video

How most hackers get into systems

In part two of CSO's interview with Gabe Bassett from Verizon Enterprise Solutions at ShmooCon 2017, Steve Ragan and Bassett discuss why vulnerabilities are not the major vectors that hackers use to get into a company's infrastructure. Watch Now

Thumbnail Image

iPads 'more secure than voting systems' -- claim

Report claims potential vulnerabilities in Dutch voting system Read More

Thumbnail Image
Video

Managing risk by understanding attack surfaces

At ShmooCon 2017, CSO's Steve Ragan sits down with Gabe Bassett, senior information security data Scientist at Verizon Enterprise Solutions. The two discuss how attack surfaces work within the Verizon Data Breach Investigations Report (DBIR) and how companies can use those to assess their risk profiles. Watch Now

Thumbnail Image

Easy-to-exploit authentication bypass flaw puts Netgear routers at risk

It has taken Netgear over six months to identify router models vulnerable to a serious authentication bypass vulnerability and to release patches for them. Read More

Thumbnail Image

Facebook looks to revamp password recovery by supplanting email

Forgot your password? Well, Facebook wants to help you recover your account. The company is releasing an open source protocol that'll let third-party sites recover a user's account through Facebook, or any trusted service. Read More

White Paper: Delta Risk

Cybersecurity and the Board of Directors

A spate of high-profile, high-impact cyber breaches at several of the largest financial institutions in the United States has brought attention to a point that cybersecurity professionals have long taken as an article of faith: boards of directors need to take an active role in the management of cyber risk. Yet, there are several factors that tend to prevent effective engagement in cybersecurity risk at the board level. Read More

Ready for action: 6 big ideas in digital transformation

This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here

December Digital Magazine: 2017 Tech Forecast

Check out the December Digital Magazine, featuring our Tech Forecast 2017 special report, which outlines the top priorities in hiring, spending and projects for IT leaders. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive