Microsoft apes Apple’s failed app strategy in Windows 10

Email not displaying correctly? View it in your browser.

InfoWorld Security Report

Mar 07, 2017
Featured Image

4 strategies to root out your security risks

To defend yourself, you must first understand the security flaws that let bad guys exploit your environment Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Microsoft apes Apple’s failed app strategy in Windows 10
Bitbucket tightens security on private code
HackerOne opens up bug bounties to open source
Pence used private mail for state work as governor, and account was hacked
Free decryption tools now available for Dharma ransomware

White Paper: GlobalSCAPE

5 Rings of Data Integration Hell

Dante's "9 Circles of Hell" depicts a journey characterized by increasing levels of an individual's depravity, and presumably, increased levels of punishment. There are corollaries when it comes to addressing data integration issues in your environment that, when not properly addressed, create severe levels of "anguish" on a daily basis. Compounded, these issues can affect company efficiency, profitability, and tenure in your current position. Read More

Thumbnail Image

Microsoft apes Apple’s failed app strategy in Windows 10

Apple's Mac App Store is clearly Microsoft's model to force Universal Windows Platform adoption, but Apple didn't exactly succeed in its own attempt Read More

Thumbnail Image

Bitbucket tightens security on private code

Administrators can use IP whitelisting and two-step verification to have full control over who can view or work with private code repositories Read More

Thumbnail Image

HackerOne opens up bug bounties to open source

The platform helps teams handle vulnerability submissions, coordinate communications, identify duplicate reports, and run bug bounty programs Read More

Thumbnail Image

Pence used private mail for state work as governor, and account was hacked

The vice president’s AOL account -- which he used repeatedly to transact state business when he was governor -- was reportedly hacked Read More

Thumbnail Image

Free decryption tools now available for Dharma ransomware

Researchers created decryption tools for the Dharma ransomware after someone recently leaked the decryption keys for the program online Read More

White Paper: GlobalSCAPE

Be Afraid of Your Shadow: What is 'Shadow IT' and How to Reduce It

Are you making it too easy for hackers to infiltrate your system? If your employees are using unsanctioned devices and applications, then the answer is yes! Unsanctioned devices and applications can leave your IT infrastructure and data far more vulnerable to being exploited by cybercriminals. Unfortunately, it's become easier than ever for employees to access rogue applications, much to the chagrin of busy IT staff. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Security Report as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.