Google, Intel pledge join efforts on Kubernetes, machine learning, IoT, and more

Email not displaying correctly? View it in your browser.

InfoWorld Security Report

Nov 22, 2016
Featured Image

Moment of truth: Web browsers and the SHA-1 switch

SHA-1 encryption is ending. Here's how your browser will react Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Google, Intel pledge join efforts on Kubernetes, machine learning, IoT, and more
Users should avoid Microsoft's newly released preview Windows patches
NIST shifts focus of security guidance to ‘engineering'
Rust language revs up compiler speed
Time's almost out for websites to abandon SHA-1

eGuide: Citrix Systems

eGuide: A Mobile Security Strategy for Your Workforce

The mobile workforce is here to stay, but many IT organizations still lack a mobile security strategy that comprises both PCs and mobile devices-and the applications and data on those devices. As one of our writer's asks, what are these enterprises waiting for? Read More

Thumbnail Image

Google, Intel pledge join efforts on Kubernetes, machine learning, IoT, and more

Joint projects between Google and Intel point up areas in which both can collaborate, and places where Intel is looking to maintain an edge as the PC market dries up Read More

Thumbnail Image

Users should avoid Microsoft's newly released preview Windows patches

Microsoft’s new monthly patching cadence include 'previews' that are not for general consumption, including KB 3197869 Read More

Thumbnail Image

NIST shifts focus of security guidance to ‘engineering'

The National Institute of Standards and Technology adapts existing engineering framework to show how to build security into software and hardware Read More

Thumbnail Image

Rust language revs up compiler speed

Rust 1.13 is out, but it's marred by a 'serious' bug in ARM code generation Read More

Thumbnail Image

Time's almost out for websites to abandon SHA-1

One-third of all websites still rely on the insecure SHA-1 encryption algorithm, as the deadline to switch draws closer Read More

White Paper: Softchoice Corporation

The Essential Guide to Microsoft Azure Security

Every week thousands of businesses are building apps, off-loading workloads and hosting core infrastructure with Microsoft Azure. Since 2014 Microsoft has boosted its cloud offerings with major improvements to security, compliance and product releases. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Security Report as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.