How computer security changed in 2015

Compiled By Unknown - Tuesday, December 22, 2015 No Comments

iPad, Android, and Surface: The fight for the soul of the tablet

Email not displaying correctly? View it in your browser.

InfoWorld Daily: Morning Edition

Dec 22, 2015
Featured Image

How computer security changed in 2015

We made progress, suffered setbacks, added complexity, but did little to deter the onslaught of cyber crime. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

iPad, Android, and Surface: The fight for the soul of the tablet
Best practices can defeat 'devastating' Kerberos flaw
Hello Barbie! Welcome to the cloud and IoT

White Paper: Cisco Systems

Advanced Malware Protection: Control Advanced Malware with More Visibility

Find out the multiple ways to implement Cisco AMP, from the endpoint to the network, mobile devices, and virtual environments. Read More

Thumbnail Image

iPad, Android, and Surface: The fight for the soul of the tablet

The iPad's unique value proposition may be ending, and a new generation of laptops could displace it. Read More

Thumbnail Image

Best practices can defeat 'devastating' Kerberos flaw

Despite claims that the problem lies in how Microsoft implements Kerberos in Windows, standard best practices and hardening rules can stop Golden Ticket and pass-the-hash attacks. Read More

Thumbnail Image

Hello Barbie! Welcome to the cloud and IoT

Barbie's latest iteration uses an AI engine that connects to a back-end server in a cloud, and it's only the beginning of IoT tech in our daily lives. Read More

White Paper: Cisco Systems

AMP BDS: Cisco AMP Excels in NSS Labs Test

Read the NSS Labs report to see how Cisco AMP proved effective against all evasion techniques tested and passed all stability and reliability tests. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, ITworld, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Daily: Morning Edition as milanshrestha747.java@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2015 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.

Tags:

No Comment to " How computer security changed in 2015 "