Page 82 - cdm-2014
P. 82







05/05/2014 02:53 (The Daily Journal (AP))
...products and services for large enterprises. While many don't realize it, computer security is actually a key part of IBM's
business. If the company...



11 reasons encryption is (almost) dead


05/05/2014 02:03 (Computerworld)
...yourself in the 7 sneak attacks used by today's most devious hackers, 14 dirty IT security consultant tricks, 9 popular IT
security practices...




Enterprises are not monitoring access to sensitive data

05/04/2014 22:43 (Computer World Singapore)
...emotional response? Because data exfiltration is a worst-case outcome of a cyber-attack - think Target, the NY Times,
Google Aurora, Titan Rain,




OAuth weakness threatens users of social media sites

05/04/2014 21:58 (Computer World Singapore)
...as a trusted site, experts say. This is typically done through a phishing email with a link to the malicious site. In logging
into the bogus...




How federal bill C-13 could give CSIS agents — or even Rob Ford — access to your personal
online data

05/04/2014 19:42 (National Post)



Cyber contractors ramp up new tools for NSA


05/04/2014 03:01 (HeraldNet.com)
...company may have done with the U.S. government. Most defense contractors have launched cyber-weapons programs;
many have grown through acquisitions...




Is the NSA Hiding Another Heartbleed?

05/03/2014 01:09 (Yahoo! News)
...Directorate, the part of the NSA responsible for protecting national computer networks by discovering and patching
security holes. On the other,

! " $ !
! # ! "
   77   78   79   80   81   82   83   84   85   86   87