Security - Infoworld http://podcasts.infoworld.com/t/2094 en Microsoft slashed Windows XP custom support prices just days before axing public patches http://podcasts.infoworld.com/d/microsoft-windows/microsoft-slashed-windows-xp-custom-support-prices-just-days-axing-public-patches-240623?source=rss_security <p>Just days before Microsoft retired Windows XP from public support, the company drastically reduced the price of custom support agreements that give large companies and government agencies another year of XP patches, experts reported today.</p> Microsoft Windows Security Microsoft Windows XP Microsoft Windows Patch Management Security Wed, 16 Apr 2014 14:45:31 +0000 admin 240623 at http://podcasts.infoworld.com The right way to secure the Internet of things http://podcasts.infoworld.com/d/security/the-right-way-secure-the-internet-of-things-240486?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/connections.jpg" alt="The right way to secure the Internet of things" width="243" height="182" align="right" /><br /><em><p align="right">Credit: VLADGRIN</p> Security Authentication Endpoint Protection Security Tue, 15 Apr 2014 10:00:00 +0000 Roger A. Grimes 240486 at http://podcasts.infoworld.com Users, admins, developers: Here's what to do about Heartbleed http://podcasts.infoworld.com/t/security/users-admins-developers-heres-what-do-about-heartbleed-240444?source=rss_security <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/heartbleed.jpg" alt="Users, admins, developers: Here's what to do about Heartbleed" width="243" height="182" align="right" /></div> <p>Let's face it: Heartbleed is a bloody mess. Worse, it's a different kind of mess for everyone who has to clean up after it. Security Open Source Software Security Mon, 14 Apr 2014 18:58:29 +0000 InfoWorld Tech Watch 240444 at http://podcasts.infoworld.com Stop laying the blame for Heartbleed on open source http://podcasts.infoworld.com/d/open-source-software/stop-laying-the-blame-heartbleed-open-source-240434?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/Security_web_1_hp.jpg" alt="Stop blaming open source for Heartbleed" width="243" height="182" align="right" /></div><p>I've spent the last week considering the data and opinions concerning the <a href="http://www.infoworld.com/t/security/5-no-bull-facts-you-need-know-about-heartbleed-right-now-240269">Heartbleed bug</a> that was found in the widely used OpenSSL cryp</p> Open Source Software Encryption Open Source Software Security Mon, 14 Apr 2014 17:06:14 +0000 Simon Phipps 240434 at http://podcasts.infoworld.com 3 big lessons to learn from Heartbleed http://podcasts.infoworld.com/d/data-center/3-big-lessons-learn-heartbleed-240270?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/heart_circuitboard.jpg" alt="3 big lessons to learn from Heartbleed" width="243" height="182" align="right" /><br /><em><p align="right">Credit: Svitlana Pidburtna</p></em></div> Data Center Open Source Software Security Encryption Systems Management Open Source Software Data Center Security Mon, 14 Apr 2014 10:00:00 +0000 Paul Venezia 240270 at http://podcasts.infoworld.com NSA denies knowing about Heartbleed flaw for years http://podcasts.infoworld.com/d/security/nsa-denies-knowing-about-heartbleed-flaw-years-240389?source=rss_security <p>The U.S. National Security Agency, which has a cybersecurity mission in addition to surveillance, has disputed a report that it knew about the Heartbleed security vulnerability for at least two years before other researchers disclosed the flaw this month.</p> Security Government Security Fri, 11 Apr 2014 22:23:36 +0000 admin 240389 at http://podcasts.infoworld.com Video: A beginner's guide to Heartbleed http://podcasts.infoworld.com/t/security/video-beginners-guide-heartbleed-240363?source=rss_security <p>Heartbleed, which has been at the center of some serious security hysteria this week, is actually a simple twist of the clasic buffer overflow exploit. What's a buffer overflow and how did Heartbleed tweak it, you ask -- or, perhaps more accurately, your nontechie friends and family members ask? The video below offers a basic explanation.</p> Security Fri, 11 Apr 2014 18:41:55 +0000 InfoTube 240363 at http://podcasts.infoworld.com FTC can sue companies hit with data breaches, court says http://podcasts.infoworld.com/d/the-industry-standard/ftc-can-sue-companies-hit-data-breaches-court-says-240272?source=rss_security <p>A federal court in New Jersey this week affirmed the Federal Trade Commission's contention that it can sue companies on charges related to data breaches, a major victory for the agency.</p> <p>Judge Esther Salas of the U.S. District Court for the District Court of New Jersey ruled that the FTC can hold companies responsible for failing to use reasonable security practices.</p> Security The Industry Standard Government Security Thu, 10 Apr 2014 19:20:36 +0000 admin 240272 at http://podcasts.infoworld.com 5 no-bull facts you need to know about Heartbleed right now http://podcasts.infoworld.com/t/security/5-no-bull-facts-you-need-know-about-heartbleed-right-now-240269?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/numbers_1_to_5.jpg" alt="5 no-bull facts you need to know about Heartbleed right now" width="243" height="182" align="right" /><br /><em><p align="right">Credit: iStockphoto</p></em></div> Open Source Software Security Encryption Hacking Internet Privacy Open Source Software Web Security Security Thu, 10 Apr 2014 18:20:10 +0000 InfoWorld Tech Watch 240269 at http://podcasts.infoworld.com The Heartbleed OpenSSL flaw is worse than you think http://podcasts.infoworld.com/d/security/the-heartbleed-openssl-flaw-worse-you-think-240231?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/lock_screen.jpg" alt="Repeat after me: Model your security threats first" width="243" height="182" align="right" /><br /><em><p align="right">Credit: iStockphoto</p></em></div> Security Security Management Security Thu, 10 Apr 2014 12:17:20 +0000 Roger A. Grimes 240231 at http://podcasts.infoworld.com 6 ways the Internet of things will transform enterprise security http://podcasts.infoworld.com/d/security/6-ways-the-internet-of-things-will-transform-enterprise-security-239999?source=rss_security <p>Most enterprise security organizations are unlikely to have a spamming refrigerator on top of their list of things to worry about. But news earlier this year that an Internet-connected fridge was co-opted into a botnet that sent spam to tens of thousands of Internet users is sure to have piqued the interest of at least a few.</p> <p>If nothing, the incident showed how even a benign consumer appliance could pose a danger to enterprises if connected to the Internet without proper security protections.</p> Security Internet of things Consumer Electronics Security Thu, 10 Apr 2014 10:00:00 +0000 admin 239999 at http://podcasts.infoworld.com Let's remember the real victims of Heartbleed: Cyber thieves http://podcasts.infoworld.com/t/cringely/lets-remember-the-real-victims-of-heartbleed-cyber-thieves-240213?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/broken_chain.jpg" alt="Let's remember the real victims of Heartbleed: Cyber thieves" width="243" height="182" align="right" /><br /><em><p align="right">Credit: Stockbyte</p> Security Cringely Security Thu, 10 Apr 2014 10:00:00 +0000 Robert X. Cringely 240213 at http://podcasts.infoworld.com Repeat after me: Model your security threats first http://podcasts.infoworld.com/d/security/repeat-after-me-model-your-security-threats-first-239951?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/lock_screen.jpg" alt="Repeat after me: Model your security threats first" width="243" height="182" align="right" /><br /><em><p align="right">Credit: iStockphoto</p> Security Security Management Security Tue, 08 Apr 2014 10:00:00 +0000 Roger A. Grimes 239951 at http://podcasts.infoworld.com Businesses face rising political pressure from data breaches http://podcasts.infoworld.com/d/security/businesses-face-rising-political-pressure-data-breaches-239953?source=rss_security <p>The data breaches like the one at Target and more recently a unit of credit bureau Experian are fueling consumer protection efforts that could have an impact on business.</p> <p>Last week, the Federal Trade Commission urged Congress to pass national breach notification legislation, while in California, a bill introduced recently in the state Legislature would ban businesses from storing certain customer data for long periods of time.</p> Security The Industry Standard Federal Regulations Data Security Security Mon, 07 Apr 2014 12:25:50 +0000 admin 239953 at http://podcasts.infoworld.com New Windows Phone security necessary, but not groundbreaking http://podcasts.infoworld.com/d/security/new-windows-phone-security-necessary-not-groundbreaking-239800?source=rss_security <p>Microsoft, which is far behind Apple and Google in the smartphone market, has introduced a number of security features in Windows Phone that are not groundbreaking, but necessary to attract businesses.</p> <p>The improvements are part of Windows Phone 8.1, which Microsoft executives unveiled Wednesday during the opening keynote of the Build developer conference in San Francisco.</p> Mobile Technology Security Windows Phone Mobile Technology Security Thu, 03 Apr 2014 14:32:53 +0000 admin 239800 at http://podcasts.infoworld.com Dealing with the application explosion http://podcasts.infoworld.com/t/mobile-technology/dealing-the-application-explosion-239609?source=rss_security <p><em>The application landscape has changed forever. With fat local apps, Web apps, SaaS apps, and mobile apps, it's becoming harder to manage and secure the unprecedented diversity of applications that drive the enterprise. In this week's New Tech Forum, Chandra Sekar (senior director of product marketing for Citrix Mobile Platforms) and Kevin Strohmeyer (director of product marketing for Desktops and Apps) of Citrix take us through some of the challenges and potential solutions to deal with today's app explosion. -- Paul Venezia</em></p> Mobile Technology Microsoft Windows Virtual Desktop Mobile Technology Security Wed, 02 Apr 2014 10:00:00 +0000 New Tech Forum 239609 at http://podcasts.infoworld.com Protect your source code before it's too late http://podcasts.infoworld.com/d/security/protect-your-source-code-its-too-late-239537?source=rss_security <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/virus_code_hp.jpg" alt="Protect your source code before it's too late" width="243" height="182" align="right" /></div> <p>It's one of the great computer security lessons.</p> Security Application Security Hacking Insider Threats Security Tue, 01 Apr 2014 10:00:00 +0000 Roger A. Grimes 239537 at http://podcasts.infoworld.com How to build stronger password hashes? Hold a contest http://podcasts.infoworld.com/t/security/how-build-stronger-password-hashes-hold-contest-239279?source=rss_security <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/02OPsecadvise_hp_0.jpg" alt="How to build stronger password hashes? Hold a contest" width="243" height="182" align="right" /></div> <p>In the password security arms race, the bad guys are winning. Security Encryption Password Security Security Fri, 28 Mar 2014 10:00:00 +0000 InfoWorld Tech Watch 239279 at http://podcasts.infoworld.com Info sec industry still struggles to attract women http://podcasts.infoworld.com/t/it-jobs/info-sec-industry-still-struggles-attract-women-239058?source=rss_security <p>Even as women have made dramatic advances in medicine, law, and other fields, the proportion of women pursuing undergraduate degrees in the computer sciences has actually been dropping, from around 30 percent in 1990 to 18 percent in 2010, according to the latest data from the National Science Foundation. As a result, according to the Census Bureau, women accounted for just 27 percent of computer science professionals down from 34 percent in 1990.</p> Security IT Jobs Security Tue, 25 Mar 2014 17:28:21 +0000 admin 239058 at http://podcasts.infoworld.com You want to know who has access to what? Good luck http://podcasts.infoworld.com/d/security/you-want-know-who-has-access-what-good-luck-239018?source=rss_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/lock_screen.jpg" alt="You want to know who has access to what? Good luck" width="243" height="182" align="right" /><br /><em><p align="right">Credit: iStockphoto</p></em></div> Security Access Control Endpoint Protection Identity Management Security Tue, 25 Mar 2014 10:00:00 +0000 Roger A. Grimes 239018 at http://podcasts.infoworld.com