|
White Paper: Dell - Quest Software Security is a moving target. To play it safe, you err on the side of a static approach but users complain that it's restrictive. If your security could adapt to the context of user access, then you could provide the access they need without worrying about stolen user credentials. Read More ▶ |
In this episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with Jim Reavis, CEO of the Cloud Security Alliance, about whether enterprises have finally trusted cloud services for their corporate data, and how the Internet of Things could affect cloud security in the future. Watch Now ▶ |
|
Antivirus vendor Avast Software has agreed to buy rival AVG Technologies for US$1.3 billion in cash. Read More ▶ |
|
Officials warn of a 'new' high-tech method thieves are using to steal cars: using laptops to hack car ignitions. Read More ▶ |
|
|
Researchers have identified a new Mac backdoor program that's designed to steal credentials stored in the OS encrypted keychain and give attackers control over the system. Read More ▶ |
|
The FTC issued a warning today about a scam that sounds ridiculous but is nonetheless surprisingly common: Con artists are convincing victims that they’re from the IRS and will accept outstanding payments in the form of iTunes cards. Read More ▶ |
|
A new strategy for training bug-finding tools could help catch more vulnerabilities. Read More ▶ |
|
Many users don't realize it, but their internet router is the most important electronic device in their home and is an attractive target for attackers. Read More ▶ |
|
The encryption methods used to secure today’s internet won’t be impenetrable forever. More powerful “quantum computers” in the future could very well crack them. Read More ▶ |
|
White Paper: Trend Micro Incorporated Effectively thwarting modern malware and targeted attacks requires a new level of integration and coordination among traditional domain-level controls and next-generation, centralized security analysis, correlation, and management systems. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS When tech and fashion collide Read More ▶ |
Most-Read Stories |