The implementation of the Server Message Block network file-sharing protocol in Windows has a serious vulnerability that could allow hackers to, at the very least, remotely crash systems. Read More ▶ | | | White Paper: KnowBe4 Bad guys are constantly coming out with new versions of ransomware strains to evade detection. Is your network effective in blocking ransomware when employees fall for social engineering attacks? KnowBe4's Ransomware Simulator "RanSim" gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 10 ransomware infection scenarios and show you if a workstation is vulnerable to infection. Read More ▶ | Microsoft will likely wait until February 14 to fix a publicly disclosed vulnerability in the SMB network file sharing protocol that can be exploited to crash Windows computers. Read More ▶ | | Enterprises can now connect cellular IoT devices to back-end systems via NetBond, a private network service from AT&T, instead of the Internet, the carrier announced this week. Read More ▶ | | | Google has been ordered by a federal court in Pennsylvania to comply with search warrants and produce emails stored abroad, in a decision that is in sharp contrast to that of an appeals court in a similar case involving Microsoft. Read More ▶ | | Google was told by a U.S. judge to hand over emails stored on international servers to the FBI. Microsoft, however, won a similar case last year, where they did not have to comply with FBI requests. So why the change? Read More ▶ | | The U.K.'s defense secretary is accusing Russia of using cyberattacks to "disable" democratic processes across the West, and he's demanding that NATO fight back. Read More ▶ | | White Paper: Leidos A comprehensive look at the top four challenges facing your security operations is the first step to mitigating them. Why not approach them as opportunities to strengthen your cybersecurity posture and better protect your assets! This white paper discusses the universal challenges facing every SOC: Resource allocation, Threat alert management, Vendor dependencies, Intelligence standardization Read More ▶ | Learn how to prevent data biases in the January/February 2017 issue of Computerworld's monthly Digital Magazine. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here ▶ | Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now ▶ | Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now ▶ | Search multiple listings now and get new job alerts as they are posted. Check them out now ▶ | | | |
0 comments:
Post a Comment