Thursday, August 21, 2014

5 cool new security research breakthroughs

  A basic encryption strategy for storing sensitive data | Many Chrome browser extensions do sneaky things
 
 
  ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


5 cool new security research breakthroughs
University and vendor researchers are congregating in San Diego this week at USENIX Security '14 to share the latest findings in security and privacy. Here are 5 that are particularly interesting. Read More
 


: MoreDirect

Datacenter eGuide
In this eGuide, InfoWorld along with sister publications CIO and Computerworld look at some current and future trends in data center innovation. Read on to learn what technologies are essential for high-performing data centers today, and to get a glimpse of what the data center of tomorrow may look like. Read Now

WHITE PAPER: Citrix

8 Steps to Fill the Mobile Enterprise Application Gap
Mobile devices and applications are quickly becoming as important and widespread in the enterprise as PCs and traditional business apps. Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they choose. Read now

A basic encryption strategy for storing sensitive data
  How to safely keep your data in a database. Read More
 

Many Chrome browser extensions do sneaky things
An analysis by security researchers of 48,000 extensions for Google's Chrome browser uncovered many that are used for fraud and data theft, actions that are mostly undetectable to regular users. Read More
 

'Reveton' ransomware upgraded with powerful password stealer
  A type of malware called Reveton, which falsely warns users they've broken the law and demands payment of a fine, has been upgraded with powerful password stealing functions, according to Avast. Read More
 

Former employees have become 'application menace' new study claims
Many former employees retain alarming levels of access to critical business applications after they've stopped working for a company, a survey for cloud services firm Intermedia has claimed. Read More
 


WHITE PAPER: Polycom

The Impact of Polycom Voice Solutions for Microsoft Lync
Download this study to learn how one organization with 24,000 Polycom voice devices and Lync Enterprise Voice achieved a 98% risk-adjusted ROI and a payback period of 21 months. Learn more >>

Symantec folds nine Norton products into one service
Symantec will consolidate its cluttered Norton line of security software, folding nine products into one online service that can be used across desktop computers and mobile devices. Read More
 

Why would Chinese hackers want hospital patient data?
  The theft of personal data on 4.5 million patients of Community Health Systems by hackers in China highlights the increasing degree to which hospitals are becoming lucrative targets for information theft. Read More
 

Start-up fights ambush attacks on SDN, virtual machine networks
GuardiCore developing "honeypot" approach to detecting and blocking stealthy attacks. Read More
 

How to use Gmail 2-step verification on multiple devices
You use Google's security tools to protect your Gmail account in your browser. Here's how to use them with applications and devices. Read More
 

Review: Citrix Xen Mobile rates a spot on your MDM short list
XenMobile 9.0 delivers topnotch features, granular security policies. Read More
 

 

BOOK GIVEAWAYS:

We've got 5 copies of each of these new books to give away to some lucky ITworld readers. Enter now for your chance to win!

The Official Ubuntu Book, 8th Ed.

Essential Mobile Interaction Design

DON'T MISS...

Why many programmers don't bother joining the ACM

Top 25 free tools for every Windows desktop

10 amazing (and bizarre) drone discoveries

Just their type: 10 keyboards beloved by programmers
 

11 colorful characters seen at Comic-Con International 2014


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.