Tuesday, March 25, 2014

5 ways to prevent data loss in mobile environments

Avast: Windows XP users already attacked 6 times more often than Windows 7 users | 5 ways to prevent data loss in mobile environments

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


A thin lifeline for XP users: New Malwarebytes suite will support the older OS
The new Anti-Malware Premium suite unites five technologies under a new interface, including a behavior-based detection engine. Read More


WHITE PAPER: Neustar Inc.

Four Ways DNS Can Accelerate Business Growth
This e-book describes how DNS has developed over the years to support business growth as new needs have emerged, for example, advanced traffic management and protection from cyber threats. Learn More

WEBCAST: IBM

Fraud Prevention Q&A
Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both the commercial and public sector space. Learn More.

Avast: Windows XP users already attacked 6 times more often than Windows 7 users
And that's BEFORE Microsoft discontinues Windows XP security support on April 8. Read More

5 ways to prevent data loss in mobile environments
Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data loss on mobile devices. Read More

New methods for addressing insider threats: A roundtable discussion
Technology advances have made it easier to detect subtle, anomalous end-user behavior, such as installation of unusual apps on endpoint devices, or suspicious deviations from baseline activity. This roundtable discussion examines methods to build monitoring, control and context into enterprise insider threat protection efforts – both when dealing with privileged users and regular employees. Read More

4 lessons from the Target breach
Retail giant Target made headlines after announcing that 110 million Americans were affected by a massive data breach at its stores. If you want to avoid the same fate, pay attention to these four lessons learned in the wake of the Target breach. Read More


WHITE PAPER: Sophos, Inc.

Mobile Device Management Buyers Guide
Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices from smartphones to tablets. In this guide, you'll learn what you need to consider to find a MDM solution that best fits your needs. Learn More

Newest bug bounty touts $10K rewards, appeals for help in finding Flash flaws
A new entry in the cash-for-bugs business, the Internet Bug Bounty, recently paid out its first $10,000 rewards. Read More

Rogue apps could exploit Android vulnerability to brick devices, researchers warn
A vulnerability in Android that was publicly disclosed in mid-March could be exploited by malicious applications to force devices into an endless reboot loop, according to security researchers from Trend Micro. Read More

Security Manager's Journal: Stopping vendors from making us a Target
The notorious Target breach of late last year just might get me some things I think my company has needed. Read More

Palo Alto Networks buys endpoint security software maker Cyvera for $200M
Palo Alto Networks, known for its next-generation firewall, Monday said it is buying Israeli start-up Cyvera for about $200 million to gain access to its endpoint security product for real-time attack prevention. The deal is expected to close in a few weeks. Read More


Remembering Patrick J. McGovern, 1937-2014

Over a span of 50 years, Pat McGovern oversaw IDG's launch of more than 300 magazines and newspapers and championed the expansion of IDG's network to include more than 460 websites, including ITworld, 200 mobile apps and 700 events worldwide. In addition to a career dedicated to information technology, he created the McGovern Institute for Brain Research at MIT. Our thoughts are with his family.


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.