Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Friday, June 12, 2015
Labor Dept. plans an H-1B probe that could have an impact
The Webroot 2015 Threat Brief provides the latest cyber threat trends collected from tens of millions of users and over 30 security technology partners and shows how collective threat intelligence that is shared across users and organizations is the only winning way to fight cybercrime. Learn more >>
Microsoft took what appeared to be a shot at Oracle this month when its security software began deleting older versions of the Ask browser toolbar. But Oracle sidestepped Microsoft's new policy by changing its Java installer so it adds a Yahoo browser tool to IE. READ MORE
Despite robots that passed by, or even ran over, the objects they were searching for and others that never got off the starting platform, scientists said this week's NASA robotics event is pushing the technology forward. READ MORE
With watchOS 2, developers can create apps that directly tap into the Apple Watch's components, like its microphone and heart rate sensor, instead of relying on a paired iPhone for app processing. READ MORE
Thanks to massive government surveillance, specifically the NSA's national and international spy programs, the U.S. tech industry is likely to lose more than $35 billion from foreign customers by 2016. READ MORE
The BYOA trend is accelerating, as more users are ditching their current solution and introducing their own collaboration apps into the workplace, often without consulting IT. Read this study to learn four ways IT pros can regain control of collaboration. Learn More
For many small and midsize companies, having someone else remotely monitor and manage their computer networks is a no-brainer. The managed service provider can improve efficiency, reliability, security, and maintenance. But according to a new study from CompTIA, companies that don't use MSPs are more certain of that path than ever. READ MORE
Amazon Web Services launched new, more powerful general-purpose and data-warehouse virtual servers as it works to stay ahead of the competition by offering users a wider array of cloud-service options. READ MORE
This new analyst report explores the key challenges to effective vulnerability risk management, how technology integration is improving the vulnerability management process, and the emerging solutions available to help organizations move beyond scanning. Learn More.
Peruse our library of free digital magazines! Choose from a collection of smartly designed digital magazines, which include our most popular departments -- News Analysis, Features, Opinions and Shark Tank -- all free for download with registration. These digital magazines also feature Computerworld signature packages, including our IT Careers 2015 Special Report, with the latest on hot skills and hiring trends, and our Forecast 2015 report, with unique insights into the IT budgets, project priorities and staffing strategies of top IT leaders.
Healthcare IT's Seismic Shift In this edition of Computerworld's June Digital Magazine: How IT is driving the change behind the healthcare industry's move to a consumer-focused model and much more. [Registration required] To read the issue, click here.
Internet of Things: Get the latest news! Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!
Subscribe to Computerworld Daily News Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP.