How the Macron campaign slowed cyberattackers

Email not displaying correctly? View it in your browser.

InfoWorld Security Report

May 09, 2017
Featured Image

Why your security appliance will be hacked

You'd think a device built to protect your organization would contain supersecure code. Think again Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How the Macron campaign slowed cyberattackers
NIST to security admins: You've made passwords too hard
Get ready for Patch Tuesday: Block Windows Update and ignore KB 3008923
Microsoft has reissued KB 3150513 snooping patch twice this month
Microsoft rushes emergency fix for critical antivirus bug

White Paper: Cybereason

2017 Threat Hunting Survey Report

Many organizations realize that threat hunting is the next step in the evolution of the modern Security Operations Center (SOC). To gain more insights on the state of threat management in SOCs, Cybereason commissioned an online survey of over 330 cybersecurity and IT professionals. Read More

Thumbnail Image

How the Macron campaign slowed cyberattackers

Did the French president-elect's security team use cyberdeception techniques to fight off phishing attacks? Submitting fake credentials definitely qualifies Read More

Thumbnail Image

NIST to security admins: You've made passwords too hard

Passwords may not be dead, but the latest NIST guidelines promises a less frustrating and more secure authentication future Read More

Thumbnail Image

Get ready for Patch Tuesday: Block Windows Update and ignore KB 3008923

A long-obsolete December 2014-era IE update is again on offer in an apparent breakdown of the supersedence chain Read More

Thumbnail Image

Microsoft has reissued KB 3150513 snooping patch twice this month

Microsoft is refining its telemetry to better determine when your Windows PC can be automatically upgraded Read More

Thumbnail Image

Microsoft rushes emergency fix for critical antivirus bug

Microsoft's security team fixed a type confusion flaw in its malware engine that affects practically all of its security products Read More

White Paper: GreenPages Technology Solutions

5 Best Practices To Make Security Everyone's Business

Menaced by an ever-expanding array of increasingly potent threats, today's highly mobile employees are frontline participants in the struggle to secure the enterprise. So while solid security strategies must include smart policies, rigorous enforcement, and deep monitoring/ reporting, they must also reflect the needs and habits of the company's users. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Security Report as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.