Wednesday, May 24, 2017

Few firms will be ready for new European breach disclosure rules, fines

Malicious subtitles in popular media players could lead to remote compromise

Email not displaying correctly? View it in your browser.

ITworld

ITworld Today

May 24, 2017
Featured Image

Few firms will be ready for new European breach disclosure rules, fines

The new European General Data Protection Regulation goes into effect next May, with onerous notification requirements and high penalties, but a year might not be enough for firms to get ready Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Malicious subtitles in popular media players could lead to remote compromise
38% off Inateck USB 3.0 to IDE/SATA Hard Drive Adapter - Deal Alert
The 4 biggest healthcare IT headaches
Former NSA chief weighs in on cybersecurity, cyberespionage at ZertoCon
The most common errors identified in professional DNS audits
35% off Anker Phone Camera Lens Kit With Fisheye, 0.65x Wide Angle, 10x Macro - Deal Alert
Summer vacations can cause havoc for IT departments
New products of the week 5.22.17
Cisco security exec: 'Connected devices are creating 277 times more data than people are'
60% off AUKEY USB-C to HDMI Adapter, 4k 1080p Support - Deal Alert
Kubernetes foundation takes on container networking
AMD's game plan to become a machine-learning giant
Need automation? Meet Ansible, the devops darling

Webcast: OpenText

Leveraging Content Services for Personal and Process Productivity: ITworld Webcast

Date: Wednesday, May 31, 2017, 1:00 PM EDT
The Enterprise Content Management (ECM) landscape is changing, and fast. A recent pair of Forrester Wave™ reports analyzed the ECM market in two key areas - Business Content Services that enhance knowledge workers' day-to-day activities, and Transactional Content Services1 that support high-volume business processes. Read More

Thumbnail Image

Malicious subtitles in popular media players could lead to remote compromise

Researchers at Check Point have discovered a flaw affecting several popular media players, which stems from how they process subtitles. If exploited, an attacker could gain remote access to the victim's system. It's estimated that nearly 200 million video players and streaming apps use the vulnerable software. Read More

Thumbnail Image

38% off Inateck USB 3.0 to IDE/SATA Hard Drive Adapter - Deal Alert

This USB 3.0 adapter from Inateck can interface with up to three drives simultaneously. It is compatible with 2.5"/3.5" IDE/SATA hard drives and 5.25" IDE/SATA CD/DVD drives, and features a one-touch backup function. Read More

Thumbnail Image

The 4 biggest healthcare IT headaches

Experts in healthcare IT and compliance discuss the top challenges for hospitals and healthcare facilities and what CIOs can do to address them. Read More

Thumbnail Image

Former NSA chief weighs in on cybersecurity, cyberespionage at ZertoCon

Retired Gen. Michael Hayden held nothing back when addressing cybersecurity pros at the ZertoCon conference in Boston. Read More

Thumbnail Image

The most common errors identified in professional DNS audits

Chris Roosenraad, director of DNS Services at Neustar, shares some of the most common errors observed during audits of its customer's DNS infrastructure and the best practices you can take to ensure you are maximizing your DNS performance to minimize potential downtime. Read More

Thumbnail Image

35% off Anker Phone Camera Lens Kit With Fisheye, 0.65x Wide Angle, 10x Macro - Deal Alert

This multi-functional camera lens kit works on most standard sized smartphones including the iPhone 7 (excluding Plus), and brings even more life to your photos with 180-degree fisheye, 0.65x wide angle and 10x macro lenses. Read More

Thumbnail Image

Summer vacations can cause havoc for IT departments

As more companies move to ban the use of public Wi-Fi networks by employees, here's a rundown of how to avoid man-in-the-middle attacks when traveling. Read More

Thumbnail Image

New products of the week 5.22.17

Network World's final edition of its long-running highlight of the latest and greatest products in the tech sector. Read More

Thumbnail Image

Cisco security exec: 'Connected devices are creating 277 times more data than people are'

CSO Managing Editor Ryan Francis recently spoke with Anthony Grieco, senior director and trust strategy officer at Cisco's Security and Trust Organization, about how organizations can securely incorporate new technologies as they embrace digitally-enabled business model. Read More

Thumbnail Image

60% off AUKEY USB-C to HDMI Adapter, 4k 1080p Support - Deal Alert

This small reversible connector is designed to support a new wave of faster, more efficient power delivery, and up to 10 times faster data transfer speeds than USB 2.0. Read More

Thumbnail Image

Kubernetes foundation takes on container networking

The Cloud Native Computing Foundation adds another open source project to its container-centric toolbelt Read More

Thumbnail Image

AMD's game plan to become a machine-learning giant

With machine learning now a major market for GPUs, AMD wants a piece of that action — and an end to Nvidia's essential monopoly Read More

Thumbnail Image

Need automation? Meet Ansible, the devops darling

Ansible has come from nowhere to be the No. 1 choice for software automation in many organizations Read More

White Paper: Level 3

Remote Locations Put Health Information At Risk: ITworld White Paper

As more healthcare information migrates to remote locations, those players with modern infrastructures who are capable of employing advanced security will emerge ready to manage their sensitive data and connected health devices and mitigate the risks of being breached. Read More

Twitter Facebook LinkedIn Google+

You are currently subscribed to ITworld Today as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@itworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 11:03 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive