Tuesday, 27 August 2013

Quantum cryptography is the last, best defense

Finally, mobile management both IT and users can get behind | NSA broke into UN video teleconferencing system

InfoWorld's Security Central

Forward this to a Friend >>>


Quantum cryptography is the last, best defense
Quantum computing has long confused and challenged the best of us. You can read only so many technical details before your head explodes. Yet it's likely that usable quantum cryptography will be a fact of life within the decade -- and that has huge ramifications. Read More


WHITE PAPER: Akamai Technologies, Inc.

Demonstrate the Business Value of Security
Justifying the cost of a security can be difficult, no matter how valuable protection may be. In this whitepaper, Forrester Research demonstrates how to calculate the value InfoSec provides. You'll learn how to justify and defend tough financial decisions in terms the business understands. Learn More

WHITE PAPER: Webroot Software

Trade In Signature Updates for the Cloud
This eBook describes the many capabilities that put cloud endpoint protection far ahead of competitive solutions. It describes the current broken endpoint security paradigm that relies on large-footprint client software, huge signature downloads, long scan times, and dedicated servers. Learn More

Finally, mobile management both IT and users can get behind
MobileIron's new Anyware shows a smarter way to enable mobile users, especially in companies with Salesforce.com. Read More

NSA broke into UN video teleconferencing system
The U.S. National Security Agency reportedly cracked the encryption used by the video teleconferencing system at the United Nations headquarters in New York City. Read More

Mozilla 'Plug-n-Hack' project aims for tighter security tool integration
The proposed standard, called "Plug-n-Hack," will define how security extensions can work with a browser in a more usable way by allowing the security tool to declare which browsers and extensions it supports. Read More

6 ways employees are putting your company's data at risk
There are a number of things your employees could be inadvertently doing that puts your company's sensitive data and information at risk. Here are the most dangerous. Read More


DAILY NEWS, DELIVERED TO YOUR INBOX FIRST THING

Start your workday with Today's Headlines: First Look, and find out what the tech world will be talking about all day.
Subscribe now!


Do You Tweet?
Follow everything from InfoWorld.com on Twitter @infoworld.

You are currently subscribed to infoworld_sec_rpt as buzzhairs.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

To contact InfoWorld, please send an e-mail to online@infoworld.com.

Copyright (C) 2013 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@infoworld.com **


No comments:

Post a Comment