With all of the focus in the business world recently related to hackers, we have tended to overlook a group of potential bad actors who have already penetrated our perimeter security, and have access to our facilities – our employees and contractors. Read More ▶ | | | White Paper: Forcepoint Would you like a live demonstration of the Forcepoint product portfolio, tailored to your security questions and requirements? Read More ▶ | As rogue applications proliferate, the need to protect corporate data requires new tools. Read More ▶ | | There is a security ROI dance in retail today. Executives know that they can skimp on security and have a statistically decent chance the company won't get caught by a cyberthief before someone else has their job. Read More ▶ | | | The win in Ecuador's presidential elections of leftist government candidate Lenin Moreno will likely provide relief to WikiLeaks' founder Julian Assange, who had been threatened with eviction from the country's embassy in London by the opposition candidate. Read More ▶ | | A team of researchers from security vendor Cylance demonstrated a proof-of-concept ransomware program that ran inside a motherboard's Unified Extensible Firmware Interface (UEFI). Read More ▶ | | Video/Webcast: Forcepoint Privileged users often are your riskiest employees. Anyone with elevated access to data, systems andcomputer assets, from account managers to executives poses a risk. The Ponemon Report, "2016 Study on the Insecurity of Privileged Users," tells you why and how this happens. Protect yourorganization. Watch the webcast. Read More ▶ | Computerworld is seeking case studies that illustrate intriguing ways data analytics is being used everywhere from research to commerce. Do you have an interesting case study on mining data for analysis, prediction and/or boosting the bottom line? A select group of the most innovative and fascinating case studies will be showcased in September. Case studies are due May 4. Submit a case study here ▶ | The 2017 IT Salary Survey results are in! Our annual survey shows steady pay increases -- but with predictions for IT spending and hiring all over the map, salaries could be in for a wild ride. You'll find our special report in the April issue of Computerworld's Digital Magazine, which also includes News Analysis, Opinion, Shark Tank, Security Manager's Journal, the Grill and Shark Tank -- all free for download with registration. View the magazine here ▶ | Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now ▶ | Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now ▶ | Search multiple listings now and get new job alerts as they are posted. Check them out now ▶ | | | |
0 comments:
Post a Comment