Self-protection is key to Linux kernel security

Email not displaying correctly? View it in your browser.

InfoWorld Security Report

Feb 14, 2017
Featured Image

Fretting over fake news? It's only going to get worse

Soon, not even experts will be able to tell the difference between fraudulent and genuine content. Ultimately, it comes down to the reputation of whoever created it Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Self-protection is key to Linux kernel security
The best security solutions of the year
Technology of the year winner: AWS Shield
Prepare for the smart bot invasion
Infrastructure under attack: The next ransomware wave

Video/Webcast: OpenText

How to Improve Your Business for Safe, Secure, Compliant Information Flows

Hear how simplifying and running digital with the right solutions can help you outperform competitors and boost your bottom line in this new audiobook from SAP and OpenText. Find out how digital transformation helped one company reduce subscriber cancellations to record lows, and saved another company $1 million annually. Read More

Thumbnail Image
INSIDER

Self-protection is key to Linux kernel security

Finding and fixing Linux security vulnerabilities amounts to the usual whack-a-mole. The real solution is to harden the Linux kernel and let it protect itself Read More

Thumbnail Image

The best security solutions of the year

InfoWorld's 2017 Technology of the Year Awards included a record eight security products, reflecting a yearning for new solutions to stop the rising tide of attacks Read More

Thumbnail Image

Technology of the year winner: AWS Shield

The massive DDoS attack against DNS provider Dyn had IT teams scrambling to make sure they knew how to defend against DDoS attacks against their cloud environments. Amazon has an answer: AWS Shield. Read More

Thumbnail Image

Prepare for the smart bot invasion

We all know about the havoc wreaked by malicious bots, but soon, we'll have to deal with 'good' bots. How do you tell the two apart? Read More

Thumbnail Image

Infrastructure under attack: The next ransomware wave

At RSA, Georgia Tech researchers showed that industrial control systems could be exploited to launch a ransomware attack capable of holding a water treatment facility hostage Read More

Video/Webcast: NetApp

Hybrid Cloud Trends for Disaster Recovery in the Enterprise

The Hybrid Cloud requires modernizing DR solutions and processes. In order to build an effective approach to DR with hybrid cloud infrastructure, there are three key steps that must be part of the process; analyze, design, and test/refine to ensure that your data is protected and can be quickly recovered. This webinar will go into detail about the best practices and approaches that are proven successful in actual deployments. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Security Report as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.