InfoWorld Security Report |
| |
|
Project Sopris looks to create a set of secure layers that protect both hardware and their communications, and it can refresh a compromised device Read More ▶ |
|
| White Paper: Veriato Inc Someday, sometime, an employee with access to sensitive data, intellectual property, or trade secrets is going to leave your company, which makes their departure risky to the organization. Sure, you've "trusted" them as part of their employment, but when the time comes to change jobs, you can't always be certain about the motive for the move. Read More ▶ | Shodan is now offering the Malware Hunter scanning tool, which uncovers systems manipulated to control malware-infected devices Read More ▶ |
| The Android security bulletin for May covered fixes for over 100 vulnerabilities Read More ▶ |
| | The security hole involves enterprise IT remote management features in the chipmaker’s firmware Read More ▶ |
| Lightsabers, landspeeders, protocol droids -- the Force is stronger in today's research labs than you might think Read More ▶ |
| Russian hackers resorted to a similar method to abuse the OAuth protocol to phish user accounts Read More ▶ |
| White Paper: Veriato Inc The risk of malicious activity has never been more of a reality for organizations. End users today access, process, and manage privileged data more than ever as part of their job. This need for employees to use privileged data puts the organization at risk of malicious actions that include data theft, destruction, manipulation, and ransom. Read More ▶ | Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today! ▶ |
|
|
|