InfoWorld Security Report | | | | | You don't need to carry the keys to the enterprise network to have a malicious hacker tail you. Here's who's at risk and what to do about it Read More ▶ | | | | | White Paper: Blue Coat Systems Did you know that 1 in 10 cloud-based files contain regulated data, including PII, PCI, PHI and source code? This Blue Coat guide helps you identify and address the unexpected risks of the "cloud generation." Read More ▶ | | The fixes are available for all supported versions of GitLab Community Edition and GitLab Enterprise Edition Read More ▶ | | | Qualcomm has patched a high-severity flaw, but handset manufacturers' reluctance to update older models means most of them will remain vulnerable Read More ▶ | | | Security pros provide advice on where to focus your efforts when money is unexpectedly short on supply Read More ▶ | | | | | Security companies have observed attacks trying to exploit recently disclosed remote code execution flaws in the ImageMagick Web server library Read More ▶ | | | eBook: Kaspersky Lab Inc With all of the overwhelming statistics on cybercrime, it can be easy to forget that there are actual people behind these facts and figures. Have you ever wondered who they are? What countries they come from? Who are their top targets? Read More ▶ | | Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today! ▶ | | | |