InfoWorld Security Report | | To safeguard data, too many IT organizations use a chainsaw rather than a scalpel. Here's how you should be managing cloud storage access. READ MORE | | Issue highlights 1. Math to the rescue! Try this novel hacking defense 2. Wine cellars, security, and standards: Vint Cerf on IoT 3. Library misuse exposes leading Java platforms to attack | : RSA Security Inc In this eGuide, InfoWorld, CSO, CIO, and Network World examine news, trends and best practices for IAM. Read on to learn how this technology can make a difference in your organization. Learn More | Can drilling into logs tell you whether you have been -- or are being -- hacked? Yes, if you use advanced math to look for weird variations like Anomaly Detective does. READ MORE | The 'father of the Internet' has rigged a slick IoT system for his wine collection, but questions of standards and interoperability will dog developers in the outside world. READ MORE | A deserialization vulnerability in Apache Commons Collections could lead to remote code execution on JBoss, WebSphere, Jenkins, WebLogic, and OpenNMS installations, but the sky isn't falling yet. READ MORE | Resource compliments of: Citrix During this seminar, you'll learn how to protect your data on your BYO and company owned devices from the latest mobile security threats, provide mobile users secure access to files while complying with regulations, prevent data loss, minimize the risk of hackers accessing your network through malicious mobile apps and more. Join us to learn how you can protect apps and data and mitigate security threats with Citrix. Save your seat! Register today. | GET THE DEEP TECHNOLOGY INSIGHTS YOU NEED Get ongoing access to our exclusive Insider content Deep Dive PDFs and in-depth articles available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO, Network World, CSO, ITworld, and other IDG Enterprise publications. Sign up at no cost today! | | | | | |