Thursday, December 25, 2014

7 devices that make your data vulnerable

7 devices that make your data vulnerable | 3 low-tech threats that lead to high-profile breaches

ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


LAST CHANCE: Enter to win a copy of "Advanced Android Application Development, 4th Ed."
We've got 5 copies to give to some lucky ITworld readers. Enter the drawing now! Read More


: WhiteHat Security, Inc.

Application Security eGuide
In this eGuide, CSO along with sister publications Computerworld, CIO, and Networkworld examine the latest trends and thinking in application security. Read on to learn how to better protect the applications your organization develops and uses. Learn more >>

WHITE PAPER: BMC Software

Intelligent Compliance: Trust in the Data Center
With the average cost of a data breach reaching $3.5 million, the pressure is intense to maintain the security and compliance of your data center. Discover how your organization may be at risk and how you can protect your data center from costly and highly visible breaches. Read the whitepaper today to put the trust back into your data center. Learn More

7 devices that make your data vulnerable
There's a new threat landscape to consider: the Internet of Things (IoT). And the endpoints in this landscape are vulnerable to attack. Read More

3 low-tech threats that lead to high-profile breaches
More often than not, data breaches are initiated by low tech means. Here are three common low-tech attack vectors, and suggestions for how security teams can address them. Read More

How to bridge and secure air gap networks
The state of the art on Air Gap networks is changing with both better protective technologies and sneakier threats that take advantage of some very elegant and extreme hacks. Read More

Unix: Android Security Internals: Nikolay Elenkov, no starch press, 2015
Building apps for Android or thinking about it? This book on Android Security is a must read. Read More


: Samsung

Security? Leave it to Me! Samsung KNOX
Learn how Samsung KNOX's multi-layered approach to mobile security protects against malicious apps, prevents attacks from one domain spreading to another domain and more. Learn More

5 information security trends that will dominate 2015
Cybercriminals are becoming more sophisticated and collaborative with every coming year. To combat the threat in 2015, information security professionals must understand these five trends. Read More

Over 30 vulnerabilities found in Google App Engine
Researchers escaped the Java sandbox on the cloud platform and executed code on the underlying system Read More

A brief history of Mac malware
A run-down of Apple's complicated history with malware. Read More

5 lessons to help security pros craft a New Year's resolution
2014 taught us a lot of hard lessons about data breaches, privacy and corporate security. As SANS' Dr. Eric Cole points out, there are a number of valuable take aways that security leaders can reflect on to make 2015 a better year. Read More


BECOME AN ITWORLD INSIDER

Get exclusive access to premium articles, product guides, reviews and more.

- 7 tips for landing a job at a coding competition

- Data analytics scores marketing wins for the Texas Rangers

- Getting started with power-line networking

DECEMBER GIVEAWAYS

We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter now for your chance to win!

Advanced Android Application Development, 4th Edition
This guide provides in-depth explanations of code using key API features and includes downloadable sample apps for nearly every chapter. Together, they provide a solid foundation for any modern app project. Enter now!

Ubuntu Unleashed 2015 Edition: Covering 14.10 and 15.04, 10th Edition
Learn all you need to know about installation, configuration, productivity, multimedia, development, system administration, server operations, networking, virtualization, security, DevOps, and more — including intermediate-to-advanced techniques you won't find in any other book. Enter now!


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.