Thursday, December 4, 2014

IBM fixes serious flaw in Endpoint Manager for mobile device management

  IBM fixes serious flaw in Endpoint Manager for mobile device management | OpenDNS reinforces cloud security with ties to Check Point, ZeroFOX, others

  ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


Iranian hackers compromised airlines, airports, critical infrastructure companies
An Iranian cyberattack campaign dubbed Operation Cleaver compromised over 50 organizations worldwide, researchers from Cylance said. Read More


: Venafi

Securing Keys and Certificates to Critical Assets
Today's most devastating cyber attacks—including ShellShock, Heartbleed and Zombie Zero—prey on trust. And that puts your digital certificates at risk. This informative resource center explores how next-generation trust protection can help you combat today's attacks, ensuring trusted access to critical assets. Learn More

WHITE PAPER: Ixia

The Real Secret to Securing your Network
In this white paper, Ixia shares a recommended solution and eye-opening strategies for mitigating security threats. Learn how emerging visibility architectures support your security policies to help bulletproof defenses. Learn more.

IBM fixes serious flaw in Endpoint Manager for mobile device management
The flaw can be exploited to execute arbitrary code on the management server. Read More
   

OpenDNS reinforces cloud security with ties to Check Point, ZeroFOX, others
OpenDNS has developed a partner API that enables security vendors to connect their technologies to the OpenDNS cloud for enforcement, effectively extending the protection to any device no matter where it connects to the Internet. Read More

Facebook offers users more malware scanning options with ESET Online Scanner
The site will prompt users to run malware scans when suspicious behavior is detected on their computers. Read More

Report: Startup promises to catch 100% of network attacks with unique detection technology
First version of TrustPipe security software aimed at Microsoft Windows XP users. Read More

Thieves may regret stealing HP's Elitebook Folio 1020 laptops
Data from the 12.5-inch Elitebook Folio 1020 models can be wiped in case of theft. Read More


: WhiteHat Security, Inc.
   
Application Security eGuide
In this eGuide, CSO along with sister publications Computerworld, CIO, and Networkworld examine the latest trends and thinking in application security. Read on to learn how to better protect the applications your organization develops and uses. Learn more >>

New point-of-sale malware on underground markets for $2,000
LusyPOS appears to be a derivative of the Dexter and Chewbacca POS malware. Read More

 

INSIDER
How to maintain security in continuous deployment environments
As you well know, change can be the enemy of security. So how do we maintain security in software created in continuous deployment environments? Read More

 

Report: Hacker group FIN4 stealing insider info to exploit significant changes in stock prices
A group called FIN4 has been stealing insider information that could affect stock prices by hacking email accounts of key corporate executives and others privy to sensitive deals. Read More

Coming soon: Murder by Internet
Security experts now believe that the Internet of Things will -- eventually -- be used for murderous purposes. Read More

No ordinary mobile attack: The Regin menace
Regin is the story of a global cyberattack mechanism on a massive scale. Hold on to your seats, because I'm going to take you on a bumpy ride. Read More

Whitelisting project helps industrial control systems owners find suspicious files
A new service called WhiteScope contains over 300,000 known good SCADA/ICS files Read More

 

BECOME AN ITWORLD INSIDER

Get exclusive access to premium articles, product guides, reviews and more.

- 7 tips for landing a job at a coding competition

- Data analytics scores marketing wins for the Texas Rangers
   

- Getting started with power-line networking

SALARY SURVEY

What's your earning power? How does it compare with your peers'?
   
With help from you and your IT colleagues across the country, our sister site Computerworld will shine a bright light on IT compensation trends. As our way of saying thank you, survey participants can enter a drawing to win one of 3 American Express gift cards for $500! Take the survey now!


 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.