Experts generally agree that President Trump’s cybersecurity Executive Order is well intended and a good start. But several of them have specific suggestions on how it could be improved. Read More ▶ |
|
| Video/Webcast: CDW | EMC We're in the midst of the third industrial revolution -- the era of digital business. Big data analytics and the Internet of Things are giving rise to new digital business strategies. In this webcast, you will learn how converged infrastructure, built on such technologies as virtualization and flash storage, is enabling businesses to successfully achieve digital transformation. Read More ▶ | Over two dozen HP laptop models may have secretly been recording users’ keystrokes by mistake, according to a Swiss security firm. Read More ▶ |
| Online advertisers are losing billions to fraud, but one advertising network has successfully taken steps to clean up its platform. U.S. advertisers spent more $25 billion on programmatic online ads last year, meaning that about $8 billion is lost to fraud. Read More ▶ |
| | The second annual Cyber Investing Summit, held on Wall Street at the New York Stock Exchange, announced that Kevin Mitnick, the world's most famous hacker, will be its opening act on May 23, 2017. Read More ▶ |
| Intel has told a court that MGT Capital Investments has gone ahead with the announcement of the “John McAfee Privacy Phone,” even though the company that proposes to change its name to “John McAfee Global Technologies” has previously said that it did not plan to launch products and services under the McAfee mark. Read More ▶ |
| Users of Asus RT-N and RT-AC series routers should install the latest firmware updates released for their models because they address vulnerabilities that could allow attackers to hijack router settings. Read More ▶ |
| Microsoft released security patches Tuesday for 55 vulnerabilities across the company's products, including three flaws that have already been exploited in targeted attacks by cyberespionage groups. Read More ▶ |
| White Paper: Symantec The market is flooded with endpoint security technologies, incident response tools, threat intelligence feeds, and behavioral analytics. Know what the key requirements are before shopping for modern endpoint threat detection, prevention and/or response, and remediation solutions. Read More ▶ | Top 5 Stories | Editor's Picks |
|
|
|