InfoWorld Daily: Morning Edition | | | | We made progress, suffered setbacks, added complexity, but did little to deter the onslaught of cyber crime. Read More ▶ | | | White Paper: Cisco Systems Find out the multiple ways to implement Cisco AMP, from the endpoint to the network, mobile devices, and virtual environments. Read More ▶ | The iPad's unique value proposition may be ending, and a new generation of laptops could displace it. Read More ▶ | | Despite claims that the problem lies in how Microsoft implements Kerberos in Windows, standard best practices and hardening rules can stop Golden Ticket and pass-the-hash attacks. Read More ▶ | | Barbie's latest iteration uses an AI engine that connects to a back-end server in a cloud, and it's only the beginning of IoT tech in our daily lives. Read More ▶ | | | White Paper: Cisco Systems Read the NSS Labs report to see how Cisco AMP proved effective against all evasion techniques tested and passed all stability and reliability tests. Read More ▶ | Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, ITworld, and other IDG Enterprise publications. Sign up at no cost today! ▶ | | | | | |
No Comment to " How computer security changed in 2015 "