InfoWorld Security Report |
| |
|
Manufacturers can choose between two patch levels, one dedicated to device-specific fixes Read More ▶ |
|
| Video/Webcast: Okta Increasingly companies are employing cloud solutions as the foundation for running their business. Okta builds on that foundation with a full suite of identity, mobility and security products that are all fully integrated into one platform for internal and external users. Read More ▶ | Three months of phone calls prove Windows scammers are more skilled at social engineering than you think Read More ▶ |
| The Eleanor malware allows attackers to execute commands and scripts, steal and modify files and take pictures using the webcam Read More ▶ |
| There are signs that Windows Journal -- a massive security hole in Windows -- is about to get the axe Read More ▶ |
| | Check your Office 365 security settings before you cave in to (or blow off) security vendor FUD Read More ▶ |
| Vulnerabilities exist in all software applications, but in some cases, security software has worse flaws than the average application Read More ▶ |
| White Paper: Webroot Software This guide will examine a number of mitigation strategies that will help protect your organizations' data from crypto-ransomware attacks. Crypto-ransomware is no longer an annoyance. It's a highly persistent and organized criminal activity with Ransomware as a Service (RaaS) at its core. Read More ▶ | Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today! ▶ |
|
|
|