Friday, February 6, 2015

7 inspiring ideas for security leaders

  7 inspiring ideas for security leaders | Sharing mass surveillance data was illegal but is now OK, UK tribunal rules

  ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


 

INSIDER
How corporate spies access your company's secrets
Lower-level employees can infiltrate corporate assets and remain undetected for months, or even years. How can you safeguard your sensitive data from prying eyes? Read More

 


WHITE PAPER: Kaspersky Lab, Inc.

Who's Spying on You?
You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. View Now

WHITE PAPER: Kaspersky Lab, Inc.

2014 Global IT Risks Report
Kaspersky Lab's report provides a look at the attitudes and strategies toward IT security including insight into the views, opinions and strategies of other IT professionals and valuable data to help benchmark your IT security against industry peers. Learn More

7 inspiring ideas for security leaders
Amall changes can lead to big improvements in both security posture and leadership in the next few weeks. Read More

Sharing mass surveillance data was illegal but is now OK, UK tribunal rules
British intelligence agency GCHQ is pleased that the UK's bulk interception regime is now lawful Read More

 

INSIDER
Low and no-cost ways to learn about IT security
From recovering deleted files to setting up an intrusion detection system, these seven projects give you hands-on experience with an array of security tasks. Read More

 

The worst of the worst phishing scams
The depths a phishing scammer will stoop to in order to gain a buck are remarkable. Here are some of the bottom feeders to guard against in your inbox. Read More

Hack to cost Sony $35 million in IT repairs
Helped by iPhone 6 image sensor demand, Sony said its earnings won't be greatly affected by the cyberattack. Read More


: Kaspersky Lab, Inc.

Be the One Who Puts Security on the Agenda eBook
You want to maximize the potential offered by new technologies and establish an advantage over your competitors. But you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives. Learn More

Bill Gates, Stephen Hawking say artificial intelligence represents real threat
It may not be time to worry about a robot apocalypse, but artificial intelligence (AI) poses some very real threats, according to more than 100 leading scientists and tech luminaries, including Bill Gates and Stephen Hawking. Read More

White House wants 10% hike in cybersecurity spending
The Obama administration, in its proposed FY 2016 federal budget, wants more money for cybersecurity research, technology and investigators Read More

Going beyond passwords with biometric technology
Biometric technologies can supplement or even replace passwords entirely when used in conjunction with a password management program. Read More

APT developers not as smart as they're made out to be
It doesn't take a genius to develop so-called APT attacks. Read More

7 critical things to cover in your disaster-recovery plan
You never know when disaster will strike so you need a plan. Here's what it should cover. Read More

State-sponsored Chinese hackers reportedly suspected in Anthem breach
The hackers are said to have used techniques deployed in the past by China-based attackers Read More

 

FOR INSIDERS ONLY

Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

- Review: The big 4 Java IDEs compared

- 15 ways to screw up a job interview

- 12 tips to tune your Wi-Fi network

- Container wars: Interesting times ahead for Docker and its competitors

- 6 things every IT person should know

- IT Resume Makeover: How (and when) to break the rules

What are you waiting for? Sign up today!


 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2015 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.