Companies scramble to fix lack of encryption on mobile apps.

NSA 'reform': Fewer phone records, but data flow continues.

InfoWorld Security Report
December 10, 2015

Microsoft Edge has inherited many of Internet Explorer's security holes

A look at recent patch lists for IE and Edge hints that many of IE's warts will continue to haunt us. READ MORE

Twitter Facebook LinkedIn
 

Issue highlights

1. Companies scramble to fix lack of encryption on mobile apps

2. NSA 'reform': Fewer phone records, but data flow continues

3. The public cloud is more secure than your data center

4. IDG Contributor Network: A shortsighted call for softening encryption

Resource compliments of: Raytheon|Websense

2016 Cybersecurity Predictions Report

A lot has changed in 2015. The speed of security means there's only more to come. The 2016 Predictions Report identifies eight data threat trends that you must defend against immediately. This Raytheon|Websense report provides an accurate survey of 8 high risk cybersecurity threats that we can expect. Get the latest on what to expect in 2016 with the Raytheon|Websense Security Labs™ Annual Cybersecurity Predictions Report.

Companies scramble to fix lack of encryption on mobile apps

Five of the 16 companies outed in a Wandera blog post have fixed their mobile apps, which were transmitting payment card information without encryption. READ MORE

NSA 'reform': Fewer phone records, but data flow continues

The NSA can no longer scoop up Americans' phone records, but it can continue to eavesdrop on our emails, video chats, and documents. READ MORE

The public cloud is more secure than your data center

Yet another breach shows that good security practices applied to the public cloud are the best data defense READ MORE

IDG Contributor Network: A shortsighted call for softening encryption

The Paris attacks have given the government an excuse to renew efforts to gain access to encrypted private communications. It's a bad idea. READ MORE

Webcast: Level 3 Communications

The Threats Never Stops

In this information driven economy, security risks are evolving. Find out what a network-based security solution can do to limit your exposure. Learn More

GET THE DEEP TECHNOLOGY INSIGHTS YOU NEED

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO, Network World, CSO, ITworld, and other IDG Enterprise publications.

Sign up at no cost today!

Follow InfoWorld

Twitter Facebook LinkedIn Google+

You are currently subscribed to infoworld_sec_rpt as tuwanan.mono@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@infoworld.com

Copyright © 2015 InfoWorld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@infoworld.com. **