Tuesday, July 1, 2014

Facebook researcher defends controversial psychology experiment on users

  Facebook researcher defends controversial psychology experiment on users | Endpoint security demands organizational changes

 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Privacy-focused Blackphone starts shipping to early adopters
The wait is almost over for early adopters of Blackphone, an Android-based smartphone that promises enhanced privacy and security. Read More
 


WHITE PAPER: CDW

Software Lifecycle Management: Lessons
An audit can be a daunting experience.Here's how to handle one. The CDW team explained the key stages of SLM and what each entailed. CDW specialists would conduct the work and partner with Lytics to explain best practices for each stage, as well as detail options for the new SAM initiative. View Now

WHITE PAPER: Neustar Inc.
 
3 Questions to Ask Your DNS Host about Lowering DDoS Risks
Three key questions and the conversation you should be having - whether you use Neustar, another provider or your in-house team to manage your external DNS. Read Now

Facebook researcher defends controversial psychology experiment on users
A Facebook researcher behind a controversial psychology experiment on users has defended it, stating that the research aimed to investigate a common concern that seeing friends post positive content on the social networking website leads people to feel negative or left out. Read More
 

Endpoint security demands organizational changes
Large organizations should delegate endpoint security to a group dedicated to malware prevention and detection. Read More
 

1 in 5 small businesses still use Windows XP, survey says
A survey by antivirus firm Bitdefender finds that 18% of small and medium-sized businesses (SMBs) are still using Windows XP despite the end of support from Microsoft and the near-apocalyptic predictions that led up to its end of life. Read More
 

Microsoft introduces Interflow: Sharing cybersecurity threats in near real-time
Although it's currently available only in "private preview" for Microsoft Active Protections Program members, security threat information will be shared faster, creating a "collectively stronger cybersecurity ecosystem." In the long run that means protecting people better and more quickly. Read More
 

Gartner: Top trends in IT security technology
Gartner predicts rise of "digital risk officer" to protect the "digital business". Read More
 


WHITE PAPER: VMware

How to Get Started with Disaster Recovery
Few companies can afford operational disruption, yet IT budgets remain flat and can't encompass the growing need for additional resiliency measures to protect critical-business applications. Learn more!

If you want developers to give a hoot about security, take a lesson from the squirrels
The problem with all too many software developers, from a security professional's point of view, is they lack a healthy sense of mistrust. Read More
 

VMware catches up with some Apache Struts patches, but not all
  Two months after critical vulnerabilities were patched in Apache Struts, a popular open-source framework for developing Java-based Web applications, VMware released a security update to incorporate the fixes in its vCenter Operations Management Suite product but appears to have left out a more recent patch. Read More
 

FBI warns businesses 'Man-in-the-E-Mail' scam escalating
For more than a year, the IC3 is warning businesses to be on the lookout for growing scam that tricks them into paying invoices. Read More
 

How to protect yourself against privileged user abuse
An organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees. Read More
 

Microsoft to shutter security notification service
Will suspend the venerable email list July 1 because of 'changing government policies'. Read More
 

 

GIVEAWAYS:

Enter today for your chance to win!

The Rails 4 Way
Through detailed code examples, you'll dive deep into the Rails 4 code base, discover why Rails is designed as it is, and learn how to make it do exactly what you want. Enter now!

JavaScript Essentials LiveLessons (Video Training)
In 4 hours of video instruction, JavaScript Essentials LiveLessons provides a solid foundation on which to build skills, from the perspective of a web developer. Enter now!

DON'T MISS...

Ringing a bell: 11 common phrases and terms that came from obsolete technology

IT salaries for the 20 hottest tech skills

Quick Look: Ubuntu GNOME 14.04
 

Haunting photos of a village built to handle electronic waste

Willkommen software engineers! 10 countries that pay you what you're worth


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.