Wednesday, March 29, 2017

How to deal with backdoors inserted or left by vendors

FBI director floats international framework on encrypted data access

Email not displaying correctly? View it in your browser.

Computerworld Security Issues and Trends

Mar 29, 2017
Featured Image
INSIDER

How to deal with backdoors inserted or left by vendors

CSO looks at vendor backdoors, how they get into products, the challenges to finding these, mitigating the easily infected openings, and responding to this hardware, software, and IoT-based dilemma. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

FBI director floats international framework on encrypted data access
Most Android devices lack latest security patches
Fragmentation: the silent killer in security management
After getting pwned and owned, Microsoft vows to fix Edge security
7 universal rules of threat intelligence
US-CERT: Some HTTPS inspection tools could weaken security
Saks self-leaked customer data unencrypted, violating multiple rules
Cebit showcases security after Snowden
Blockchain can help secure medical devices, improve patient privacy
BlackBerry preps a more secure Samsung Galaxy S7
It's time to face the ugly reality of face recognition

Video/Webcast: CenturyLink

Five Steps to Drive Digital Transformation with Hybrid Cloud

Your multi-cloud future is here - how will you manage it? This on-demand webcast presented by Dave Bartoletti of Forrester Research and Dave Shacochis of CenturyLink discusses the current state of hybrid cloud in the enterprise and why the move is on to transform enterprise applications using multiple cloud platforms. Read More

Thumbnail Image

FBI director floats international framework on encrypted data access

The FBI director James Comey is suggesting an international approach to solving the encryption debate. He proposes that the U.S. might work with other countries on a "framework" for creating legal access to encrypted tech devices. Read More

Thumbnail Image

Most Android devices lack latest security patches

Nearly three-quarters of Android devices on the five biggest U.S. carriers are running on security patches that are at least two months old, putting them at greater risk of being hacked. Read More

Thumbnail Image

Fragmentation: the silent killer in security management

Today's detection deficit between attackers and defenders is near an all-time high – and the gap is only getting wider. While many factors contribute to this deficit, among the top is the fragmentation of people, processes, and technologies. Adam Vincent, co-founder and CEO, ThreatConnect, describes best practices for overcoming security fragmentation. Read More

Thumbnail Image

After getting pwned and owned, Microsoft vows to fix Edge security

Microsoft is working to reduce the attack surface and restrict unauthorized access of its Edge browser. Read More

Thumbnail Image

7 universal rules of threat intelligence

Recorded Future will go over the seven universal rules of threat intelligence – what you should be doing no matter what, whether you use a platform or not. Read More

Thumbnail Image

US-CERT: Some HTTPS inspection tools could weaken security

Companies that use security products to inspect HTTPS traffic might inadvertently make their users' encrypted connections less secure and expose them to man-in-the-middle attacks, the U.S. Computer Emergency Readiness Team warns. Read More

Thumbnail Image

Saks self-leaked customer data unencrypted, violating multiple rules

With so many retailers being impacted by cyber attacks, it's easy to conclude that thieves are necessary for data breaches. Not necessarily. Saks last week made clear that it can breach itself quite efficiently. Read More

Thumbnail Image

Cebit showcases security after Snowden

It's almost four years since Edward Snowden leaked U.S. National Security Agency documents revealing the extent of the organization's surveillance of global internet traffic, but he's still making the headlines in Germany. Read More

Thumbnail Image

Blockchain can help secure medical devices, improve patient privacy

If implemented properly, blockchain can help secure medical devices and improve patient privacy, according to a top security pro at Partners Healthcare. Read More

Thumbnail Image

BlackBerry preps a more secure Samsung Galaxy S7

Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel's smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics' Knox platform later this year. Read More

Thumbnail Image

It's time to face the ugly reality of face recognition

Most forms of biometric data are hard to get, and you usually need someone's permission to capture fingerprint or iris scans. But anyone can take a picture of your face. Read More

eBook: ServiceNow Inc

Modernize Your IT Approach and Increase M&A Success

Virtually all large enterprises engage in merger & acquisition (M&A) activity at some point, for a wide variety of reasons and with a broad spectrum of business objectives. Yet upwards of 70% of M&A initiatives fail to deliver the expected business results, undercutting the expected value of these transactions, which in 2015 amounted to more than $4.5 trillion globally. Read this eBook to learn more. Read More

IT Salary Survey 2017: Tech pay holds tight (for now)

The 2017 IT Salary Survey results are in! Our annual survey shows steady pay increases -- but with predictions for IT spending and hiring all over the map, salaries could be in for a wild ride. You'll find our special report in the April issue of Computerworld's Digital Magazine, which also includes News Analysis, Opinion, Shark Tank, Security Manager's Journal, the Grill and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security Issues and Trends as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive