Math to the rescue! Try this novel hacking defense.

Wine cellars, security, and standards: Vint Cerf on IoT.

InfoWorld Security Report
November 10, 2015
featured image

Blocking apps? There's a smarter way to manage mobile

To safeguard data, too many IT organizations use a chainsaw rather than a scalpel. Here's how you should be managing cloud storage access. READ MORE

Twitter Facebook LinkedIn
 

Issue highlights

1. Math to the rescue! Try this novel hacking defense

2. Wine cellars, security, and standards: Vint Cerf on IoT

3. Library misuse exposes leading Java platforms to attack

: RSA Security Inc

eGuide: Identity and Access Management

In this eGuide, InfoWorld, CSO, CIO, and Network World examine news, trends and best practices for IAM. Read on to learn how this technology can make a difference in your organization. Learn More

Math to the rescue! Try this novel hacking defense

Can drilling into logs tell you whether you have been -- or are being -- hacked? Yes, if you use advanced math to look for weird variations like Anomaly Detective does. READ MORE

Wine cellars, security, and standards: Vint Cerf on IoT

The 'father of the Internet' has rigged a slick IoT system for his wine collection, but questions of standards and interoperability will dog developers in the outside world. READ MORE

Library misuse exposes leading Java platforms to attack

A deserialization vulnerability in Apache Commons Collections could lead to remote code execution on JBoss, WebSphere, Jenkins, WebLogic, and OpenNMS installations, but the sky isn't falling yet. READ MORE

Resource compliments of: Citrix

Mobile security focused seminars coming to a city near you!

During this seminar, you'll learn how to protect your data on your BYO and company owned devices from the latest mobile security threats, provide mobile users secure access to files while complying with regulations, prevent data loss, minimize the risk of hackers accessing your network through malicious mobile apps and more. Join us to learn how you can protect apps and data and mitigate security threats with Citrix. Save your seat! Register today.

GET THE DEEP TECHNOLOGY INSIGHTS YOU NEED

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO, Network World, CSO, ITworld, and other IDG Enterprise publications.

Sign up at no cost today!

Follow InfoWorld

Twitter Facebook LinkedIn Google+

You are currently subscribed to infoworld_sec_rpt as tuwanan.mono@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@infoworld.com

Copyright © 2015 InfoWorld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@infoworld.com. **