What it takes to be a security architect

Email not displaying correctly? View it in your browser.

InfoWorld Security Report

May 11, 2017
Featured Image

Microsoft finally bans SHA-1 certificates in Internet Explorer, Edge

All SHA-1 certificates that chain back to publicly trusted certificate authorities will be blocked, but enterprise and self-signed certificates won't be affected Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What it takes to be a security architect
Here's how to check if your PC got Microsoft's fix for Windows Defender bug
Microsoft's latest patches bring many Windows and Office fixes and lots of confusion
DDoS or bust! Angry gamers come for IT

eBook: Silver Peak Systems Inc

6 Ways to Improve Your Network Security with SD-WAN

With the right SD-WAN solution, broadband internet service are secure enough for the enterprise. Read this eBook to learn six ways to use a secure SD-WAN solution to improve network security and compliance. Read More

Thumbnail Image
INSIDER

What it takes to be a security architect

While the path to security architect varies, anyone considering the role should have a passion for IT infrastructure and protecting data Read More

Thumbnail Image

Here's how to check if your PC got Microsoft's fix for Windows Defender bug

Security researcher Tavis Ormandy, one of Microsoft’s biggest critics, praises Microsoft for its rapid response to a newly discovered security hole Read More

Thumbnail Image

Microsoft's latest patches bring many Windows and Office fixes and lots of confusion

With Microsoft offering 243 security patches and a mass of nonsecurity updates, the clamor for patching clarity continues Read More

Thumbnail Image

DDoS or bust! Angry gamers come for IT

When gamers threaten to bring down the system, a tech team battens down the hatches and prepares for the worst Read More

White Paper: Zapproved, Inc

IT Buyer's Guide to Z-Discovery by Zapproved: Intuitive E-Discovery Software for Corporate Legal Teams

As an IT professional, how do you choose the right e-discovery software for your company? The journey begins with understanding how well a solution fits into your technology ecosystem. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Security Report as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.