Security

ComputerWorldIndependent

Self-protection is key to Linux kernel security

Linux has quietly taken over the world. The operating system now powers the large datacenters that make all our cloud applications and services possible, along with billions of Android devices and internet-connected gadgets that comprise the internet of things (IoT). Even the systems that handle the day-to-day operations on the International Space Station run Linux.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read More
ComputerWorldIndependent

Face-off: Oracle vs. CA for identity management

Employees come and go, or switch departments, so IT managers seek an automated way to give (or deny) them access privileges to corporate systems. Two of the top software products for identity and access management (IAM) are Oracle Identity Manager and CA Identity Manager, according to IT Central Station, an online community where IT professionals review enterprise products.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read More
ComputerWorldIndependent

Report: Trump still uses his unsecured Android phone to tweet

President Trump is still tweeting from his old Android phone in the White House, even after being given a new, secure device just before his inauguration, according to a report in The New York Times.

That revelation stirred some strong negative reactions from three mobile security analysts contacted on Thursday. Two of those analysts said using the older Android device only for tweeting doesn’t necessarily pose a national security risk, but they questioned what else he might be doing with that Android device that could pose such risks.

To read this article in full or to leave a comment, please click here

Read More

(Insider Story)

Read More
SecurityTrendMicro

Will 2017 be the Year IoT Threats Go Mainstream?

The Internet of Things (IoT) is changing the way we live and work forever. It makes us more productive, healthier and happier, and it enables businesses to work smarter, more efficiently and with greater agility. There’s just one problem: from a security perspective IoT devices are fundamentally flawed. And the bad guys are getting pretty…

Read More
ComputerWorldIndependent

Password-free security uses voice, user behavior to verify identity

Tired of conventional passwords? So is Nuance Communications, a tech firm that is promoting the human voice as a way to secure user accounts.

The company’s voice biometric product is among the technologies that promise to replace traditional — and often vulnerable — password authentication systems, which can be easy to hack. That isn’t the case with Nuance’s solution, the company claims.   

“To determine if it’s you or not, we are looking at over 100 different characteristics of your voice,” said Brett Beranek, Nuance’s director of product strategy.

The problem with passwords

The need to move beyond passwords hasn’t been more urgent, given that hackers are routinely finding ways to steal them. Last year, Yahoo, LinkedIn and Dropbox all reported major data breaches involving account details such as email addresses and hashed passwords.  

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

10 questions to ask IDaaS vendors before you buy

Identity as a service (IDaaS), also known as identity and access management as a service, uses a cloud infrastructure for securely managing user identities and access enforcement. At its most basic level, IDaaS enables single sign-on (SSO) for systems in the cloud or on-premises, but it goes well beyond that to include access provisioning and deprovisioning, governance and analytics.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read More
SecurityTrendMicro

Data Privacy Day 2017: Tips for Protecting Small Businesses

Data Privacy Day is on January 28, and I’m willing to bet this isn’t a day most people are aware of. However, with cyber threats such as ransomware, data breaches and Business Email Compromise (BEC) scams plaguing the small business landscape, spending time in observance of Data Privacy Day should be a priority. In 2016,…

Read More