Login
Password
Sources on this Page

> Headlines by Category

 Home / Technology / Security

You are using the plain HTML view, switch to advanced view for a more complete experience.

Bugtraq: [SECURITY] [DSA 3899-1] vlc security update
[SECURITY] [DSA 3899-1] vlc security update
Cybersecurity battleground shifting to Linux and web servers
Despite an overall drop in general malware detection for the quarter, Linux malware made up more than 36 percent of the top threats identified in Q1 2017. This attack pattern demonstrates the urgent need for heightened security measures to protect Linux servers and Linux-dependent IoT devices, according to WatchGuard Technologies. Key findings from WatchGuard’s latest Internet Security Report include: Linux malware is on the rise, making up 36 percent of the top malware detected in … More
Making enterprise content management secure and scalable
Content is one of the most valuable commodities that any business owns. It’s the key driver of customer interactions, the foundation of core business processes, and it helps shape senior-level decision-making. Yet enterprises are clearly challenged by the need to manage large volumes of content in multiple formats – and to do so in a compliant and secure manner. A recent technology adoption profile study by Forrester Consulting reports: “Sharing content with external parties is … More
(IN)SECURE Magazine issue 54 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 54 has been released today. Table of contents The death of passwords: Cybersecurity’s fake news? Breaking the “secure enough” mindset Cyber hygiene: The more you know What’s an IT architect, and could you become one? Report: Infosecurity Europe 2017 Is your dragline dragging in security threats? Businesses finally realize that cyber defenses must evolve A simplified guide to … More
Enterprise Security Teams Better Prepared to Address Complex Targeted Attacks with New Solution from Akamai

Akamai Technologies logo. (PRNewsFoto/AKAMAI TECHNOLOGIES)CAMBRIDGE, Mass., June 27, 2017 /PRNewswire/ -- Akamai Technologies, Inc. (NASDAQ: AKAM), the world's largest and most trusted cloud delivery platform, today introduced Enterprise Threat Protector. The new solution is designed to provide customers quick-to-deploy and...


8 ways millennials impact your security awareness program

As millennials enter the workforce in large numbers, it is important for all security programs to realize the unique challenges that they pose. While it is not fair, proper or effective to say all millennials are alike, or that older generations don't share some of these traits, it is reasonable to acknowledge some distinct trends.

Millennials are the first generation for whom computer devices are ubiquitous in their daily activities. Consider that laptops have become the computer of choice and can be taken anywhere. Cellphones are more powerful and functional than computers were a decade ago — and millenials have had these devices in their pockets for as long as most of them can remember.

To read this article in full or to leave a comment, please click here

8 ways millennials impact your security awareness program

As millennials enter the workforce in large numbers, it is important for all security programs to realize the unique challenges that they pose. While it is not fair, proper or effective to say all millennials are alike, or that older generations don't share some of these traits, it is reasonable to acknowledge some distinct trends.

Millennials are the first generation for whom computer devices are ubiquitous in their daily activities. Consider that laptops have become the computer of choice and can be taken anywhere. Cellphones are more powerful and functional than computers were a decade ago — and millenials have had these devices in their pockets for as long as most of them can remember.

To read this article in full or to leave a comment, please click here

Computer Weekly – 27 June 2017: Will mobile networks cope with the end of roaming charges?
In this week's Computer Weekly, while EU mobile users celebrate the end of roaming charges, networks have to deal with the consequences – we examine the issues. We look at the future plans for Openstack, the open source cloud environment. And we learn how European law enforcement is working with business to tackle cybercrime. Read the issue now. Published by: ComputerWeekly.com
Evaluating Mobility Management Solutions for Common Use Cases
Digital workspaces are the next logical step in enhancing productivity and security, and providing users with the seamless experiences they need – whether they are travelling, remote, or roaming users. Download this webcast to discover what a digital workspace is comprised of, use cases, and how it can benefit your organization. Published by: Citrix
IoT & the Enterprise: Exploring Opportunities and Challenges in Asia
Going by some industry estimates, the world will connect up 8.4 billion IoT devices by the end of 2017, a momentum that will continue through 2020 when 20.4 billion devices will be in use. Asia, home to two-thirds of the world's population, is expected to be the powerhouse driving global IoT developments. Published by: ComputerWeekly.com
Post Selected Items to:

Showing 10 items of about 8500

home  •   advertising  •   terms of service  •   privacy  •   about us  •   contact us  •   press release design by Popshop •   © 1999-2017 NewsKnowledge