How IBM's Watson will change cybersecurity

Email not displaying correctly? View it in your browser.

InfoWorld Security Report

Nov 15, 2016
Featured Image

Developers, don't DDoS your own apps

Software engineers can avoid launching distributed denial-of-service attacks against their own programs with proper capacity planning and app architecture Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How IBM's Watson will change cybersecurity
Linux Foundation doubles down on support for tamper-free software
Microsoft to revamp its documentation for security patches
After a decade, open source Java is still controversial
5 ways President Trump may affect computer security

White Paper: Napatech

200G Compact Solution Data Sheet

Learn more about the fastest compact 200G accelerator on the planet. Read More

Thumbnail Image

How IBM's Watson will change cybersecurity

IBM ventures into cognitive security, where AI systems learn to understand infosec terms and concepts well enough to reduce detection and response time Read More

Thumbnail Image

Linux Foundation doubles down on support for tamper-free software

The Reproducible Builds Project is designed to ensure binaries built from open source projects have not been tampered with Read More

Thumbnail Image

Microsoft to revamp its documentation for security patches

Microsoft has eliminated individual patches from every Windows version, and Security Bulletins will go away soon, replaced by a spreadsheet with tools Read More

Thumbnail Image

After a decade, open source Java is still controversial

Ten years on, Java founder James Gosling sees upside in the open source move, while others believe Sun didn't go far enough Read More

Thumbnail Image

5 ways President Trump may affect computer security

You can expect the new administration to take full advantage of surveillance techniques, ease security regulations for business, and mandate more punishment for hackers Read More

Video/Webcast: Napatech

Faster Than The Future

Our mission is to keep our customers one step ahead of the data growth curve by accelerating their applications and time-to-market while reducing risk. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Security Report as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.