InfoWorld Security Report | | | | 'Press 1 to hand us the family jewels' works more often than you might think. A little training can stop this sort of social engineering Read More ▶ | | | White Paper: Black Duck Software, Inc. Addressing the constantly-morphing landscape of open source security threats might seem like a never-ending process, but we'll help you get started in four easy steps. Read More ▶ | Here's what all those Microsoft-sanctioned registry settings actually do -- and don't do Read More ▶ | | Juniper said it has found no other evidence of tampering in its source code and pledged to replace the problematic cryptographic functions in its VPN technology with a robust alternative Read More ▶ | | In an interview with IDGE, Josh Rogers and Lonne Jaffe of Syncsort explain how they plan to transform big iron and traditional data warehouse/analytics Read More ▶ | | | Microsoft's end-of-life announcement for the browsers applies to most enterprises and is great news for developers, but there are exceptions Read More ▶ | | White Paper: ForgeRock In conducting online surveys of 111 B2C and B2B2C executives with responsibility for IAM, Forrester found that new business and technical demands require a strategic focus for which existing IAM infrastructure may not be sufficient. Read More ▶ | Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today! ▶ | | | |