Thursday, January 29, 2015

6 ways the Blackhat movie got security wrong (and 4 things it got right)

  6 ways the Blackhat movie got security wrong (and 4 things it got right) | Canadian agency reported to be monitoring millions of downloads

 
  ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


LAST CHANCE: Enter to win a copy of "Learn Ruby the Hard Way"
We've got 5 copies to give to some lucky readers. Enter for your chance to win! Read More
 


WHITE PAPER: Akamai

Overcoming the Big Disconnect in Web Security
According to a new CSO survey, companies know hackers are targeting them, but too few have plans in place for fighting back. Here are the steps you need to take to eliminate the disconnect. Learn More

WHITE PAPER: Onapsis

Building an Enterprise Application Security Program
In this research paper, Building an Enterprise Application Security program, we will take a focused look at the major facets in an enterprise application security program, and make practical suggestions on how to improve efficiency and effectiveness of your security program. Learn More

6 ways the Blackhat movie got security wrong (and 4 things it got right)
Though the plot of Blackhat takes some typical Hollywood thriller jumps, from a technical standpoint, the movie is fairly accurate. Read More
 

Canadian agency reported to be monitoring millions of downloads
The Communications Security Establishment tracks activity at more than 100 file-sharing sites, according to news reports Read More
 

IDG Contributor Network: Linux hit by critical security hole
A new security hole has been discovered in Linux that allows anyone to remotely take control of a system without knowing the username and password. Read More
 

Blackphone super-secure communications app had serious flaw
A vulnerability in the bundled encrypted messaging app would have allowed attackers to execute malicious code on the device Read More
 


WHITE PAPER: Proofpoint, Inc.
 
The New Art of War: 2014 Targeted Attacks Study
In this study, you'll receive a comprehensive overview of survey results and expert analysis on: *The common threats organizations face *Where to bolster traditional defenses *How to protect employees from targeted attacks View Now>>

Old arguments may bog down US data breach notification legislation
Questions about preemption of state laws and when companies should report breaches come up again during a hearing. Read More
 

Endpoint security trends for 2015: What can we expect?
In my data center work experience, a very significant percentage of the major network vulnerabilites I've had to fix were caused by the introduction of poorly secured computers. It's a surprisingly common blunder. Read More
 

Twenty-eight percent of security spending wasted on shelfware
The average organization spent $115 per user on security-related software last year, but $33 of it, or 28 percent, was underutilized or not used at all, according to a new report from Osterman Research."As much as 60 percent of security software remains completely unused in some organizations," the report said.Almost all of this wasted spending was on traditional packaged software, because cloud services are typically billed based on use and need little or no additional configuration or customization.Specifically, 81 percent of security software was still delivered in the traditional way, compared to 19 percent that was cloud-based, according to the survey of IT decision makers in large and small companies.To read this article in full or to leave a comment, please click here Read More
 

EU air passenger database about to take flight, but critics want it grounded
The EC is reportedly working on a plan to implement a Passenger Name Record (PNR) system, although a previous attempt failed Read More
 

 

FOR INSIDERS ONLY

Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

- Review: The big 4 Java IDEs compared

- 15 ways to screw up a job interview

- 12 tips to tune your Wi-Fi network

- Container wars: Interesting times ahead for Docker and its competitors

- 6 things every IT person should know

- IT Resume Makeover: How (and when) to break the rules

What are you waiting for? Sign up today!


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2015 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.