Thursday, December 24, 2015

Three ways to use the cloud to regain control over network endpoints

NORAD's amazing 60-year Santa tracking history

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Dec 24, 2015

Three ways to use the cloud to regain control over network endpoints

Promising new cloud-based endpoint security solutions can change how we protect against cyber intrusions. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

NORAD's amazing 60-year Santa tracking history
After Juniper security mess, Cisco searches own gear for backdoors
Poor security decisions expose payment terminals to mass fraud
Attackers are hunting for tampered Juniper firewalls
Infosec's wish list for 2016
Can collaborative security work?
About those unsecured security cameras in the U.S. without password protection
Wyndham settlement: No fine, but more power to the FTC
The year in security, identify theft and fraud

White Paper: PC Connection

Harness the Power of Flash Storage

In this white paper, you will learn how PC Connection and EMC have partnered together to offer IT solutions built on the latest, most innovative flash technologies. Read More

Thumbnail Image

NORAD's amazing 60-year Santa tracking history

The National Archive blog takes a look at the background of the nation's premier defense unit's tracking of Santa as he travels around the globe delivering his Christmas goodies. Read More

Thumbnail Image

After Juniper security mess, Cisco searches own gear for backdoors

While it says it has no reason to think there are backdoors in any of its products, Cisco has started an additional review of code in its products looking for "malicious modifications." Read More

Thumbnail Image

Poor security decisions expose payment terminals to mass fraud

Many payment terminals in Germany - and in other countries too -- were designed without following best security principles, making them vulnerable to attacks that could result in mass fraud against both customers and merchants. Read More

Thumbnail Image

Attackers are hunting for tampered Juniper firewalls

An experiment by a cybersecurity research center shows attackers are trying to find Juniper firewalls that haven't been patched to remove unauthorized spying code. Read More

Thumbnail Image

Infosec's wish list for 2016

As we approach 2016, several security experts joined us to provide their InfoSec Wish List for the new year. Some experts wish for the cyber equivalent of world peace, while others are just hoping for their digital Red Ryder, carbine action, two-hundred shot range model air rifle. Read More

Thumbnail Image

Can collaborative security work?

Many IT security pros say sharing is good, but with government, not so much. Read More

Thumbnail Image

About those unsecured security cameras in the U.S. without password protection

Observations of some of the unsecured security cameras purportedly located in the U.S. Read More

Thumbnail Image

Wyndham settlement: No fine, but more power to the FTC

The Federal Trade Commission didn't even issue a slap on the wrist to Wyndham Hotels for weak security practices that allowed multiple data breaches. But experts say that wasn't the point – the point was to establish the FTC's authority over companies' cybersecurity practices, and that remains after the recent settlement between the two parties. Read More

Thumbnail Image
INSIDER

The year in security, identify theft and fraud

There's a lot we can say about cybersecurity, identify theft and fraud in 2015, but we're going to let our infographic tell the story. Read More

White Paper: PC Connection

Protect Your Organization When the Unexpected Happens

Although hardware has become more resilient and virtualization has increased service and application portability, most BC/DR plans still fail to adequately protect organizations from harm when the unexpected happens. Read More

Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive