InfoWorld Security Report |
| |
|
You'd think a device built to protect your organization would contain supersecure code. Think again Read More ▶ |
|
| White Paper: Cybereason Many organizations realize that threat hunting is the next step in the evolution of the modern Security Operations Center (SOC). To gain more insights on the state of threat management in SOCs, Cybereason commissioned an online survey of over 330 cybersecurity and IT professionals. Read More ▶ | Did the French president-elect's security team use cyberdeception techniques to fight off phishing attacks? Submitting fake credentials definitely qualifies Read More ▶ |
| Passwords may not be dead, but the latest NIST guidelines promises a less frustrating and more secure authentication future Read More ▶ |
| | A long-obsolete December 2014-era IE update is again on offer in an apparent breakdown of the supersedence chain Read More ▶ |
| Microsoft is refining its telemetry to better determine when your Windows PC can be automatically upgraded Read More ▶ |
| Microsoft's security team fixed a type confusion flaw in its malware engine that affects practically all of its security products Read More ▶ |
| White Paper: GreenPages Technology Solutions Menaced by an ever-expanding array of increasingly potent threats, today's highly mobile employees are frontline participants in the struggle to secure the enterprise. So while solid security strategies must include smart policies, rigorous enforcement, and deep monitoring/ reporting, they must also reflect the needs and habits of the company's users. Read More ▶ | Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today! ▶ |
|
|
|