Thursday, July 31, 2014

iPhone gets first free app for encrypting voice calls

  WIN AN IPAD MINI: Got 10 minutes? Tell us about your tech interests and you might win an iPad mini | iPhone gets first free app for encrypting voice calls

 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Black Hat 2014: How to crack just about everything
From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology Read More
 


WHITE PAPER: Accellion

Best Practices for Securing Your Mobile Workforce
The typical mobile worker is carrying three or more mobile devices, at least one of which is a personal device brought from home. Organizations need to protect their data on every mobile device it resides. Read this whitepaper to learn the steps to reduce the risk of mobile data breaches while keeping mobile workers productive. Learn more>>

: KnowBe4

Why Security Awareness Training? Ransomware, That's Why...
Since September 2013, several ransomware strains are attacking end-users. You cannot just rely on your filters, you also have to train your end-users. Get a Quote for your organization now and your users trained ASAP. If your files get encrypted due to human error after your user steps through our training, KnowBe4 will pay the crypto-ransom. Learn more >>

WIN AN IPAD MINI: Got 10 minutes? Tell us about your tech interests and you might win an iPad mini
Thank you for your help! Your contribution to the success to this research survey is greatly appreciated. Read More
 

iPhone gets first free app for encrypting voice calls
An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers. Read More
 

Is "Bring Your Own Identity" a security risk or advantage?
  Questions abound over sites authenticating users via identities established through social networks, Yahoo Ponemon Institute survey shows. Read More
 

Mobile security: A mother lode of new tools
A gold rush of next-gen authentication technologies yields biometric systems, ID bracelets, new standards and more. Read More
 

Virtual servers still face real security threats
A new survey from Kaspersky finds that many IT professionals don't understand the security threats against virtual servers. Read More
 


WEBCAST: VMware | IBM

3 Virtual Desktop Must-haves
Employees today expect to take their work anywhere and on any device. This BYOD mindset poses a dilemma for organizations that want to create a flexible workplace while ensuring security, control, and lower costs. IBM and VMware collaboratively provide a dynamic VDI solution. View Now

Antivirus products riddled with security flaws, researcher says
It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned. Read More
 

Mobile management: Making sense of your options
There are known, proven approaches to reduce those risks without disabling the benefit of consumerization. Read More
 

'Right to be forgotten' ruling is unworkable and misguided, UK Lords say
The EU court ruling that gives people the "right to be forgotten" by search engines is misguided in principle and unworkable in practice, said a U.K. House of Lords subcommittee Wednesday. Read More
 

BlackBerry focuses on security for the enterprise
Now that BlackBerry has fallen significantly behind Apple and Google in the race to offer features and third-party apps for its smartphones, the company is concentrating on providing devices that, it claims, have the strongest available security -- the killer feature for the enterprise. Read More
 

Unix: Controlling privileged access
One of the most important things you can do for security on a Unix system is restrict root access. But the issue is more complicated than who knows root's password. Read More
 

 

SURVEY:

Got 10 minutes? Tell us about your tech interests and you could win an iPad mini
ITworld is conducting its annual survey about your involvement with and interest in various technology categories, and invites you to participate. Survey participants will have the opportunity to win an iPad mini and sign up to receive a report outlining survey highlights. Take the survey now!

GIVEAWAYS:

We've got 5 copies of each of these new books to give away to some lucky ITworld readers. Enter now for your chance to win!

App Accomplished: Strategies for App Development Success

SQL Queries for Mere Mortals: A Hands-On Guide to Data Manipulation in SQL

DON'T MISS...

Enterprise mobility management: Tools to create a secure and scalable mobile experience
Your goal is to choose a solution that addresses increasingly powerful mobile devices, demanding users and complex security challenges. To get you started, take a look at the key players in the market, the important differentiators of each solution and the top questions to ask. Go now!

Ringing a bell: 11 common phrases and terms that came from obsolete technology

IT salaries for the 20 hottest tech skills

Quick Look: Ubuntu GNOME 14.04
 

Haunting photos of a village built to handle electronic waste

Willkommen software engineers! 10 countries that pay you what you're worth


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.