Friday, January 22, 2016

Cybersecurity much more than a compliance exercise

26 of the craziest and scariest things the TSA has found on travelers

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jan 22, 2016
Featured Image

Cybersecurity much more than a compliance exercise

An overwhelming number of security executives view compliance as an effective strategy. But it's not, and many CISOs need to rethink their priorities. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

26 of the craziest and scariest things the TSA has found on travelers
Healthcare IT execs fear loss of life due to hacked medical devices or networks
Hottest Enterprise Networking & IT Startups of 2016
TSA: Gun discoveries in baggage up 20% in 2015 over 2014
How much at risk is the U.S.'s critical infrastructure?
Oracle fixes critical flaws in Java, Database Server
Google blocked more bad ads than ever in 2015, but they still keep coming
Data breach numbers still high in 2015
Cisco fixes critical flaws in digital encoder, unified computing manager and security appliance

White Paper: Navisite

7 Steps to Developing a Cloud Security Plan

Security concerns are top-of-mind for IT executives in light of highly publicized data breaches at a wide range of leading enterprises and organizations. Whether your IT is hosted on-premises or in the cloud. Read More

Thumbnail Image

26 of the craziest and scariest things the TSA has found on travelers

Sickles, grenades, blasting machines and cannon barrels just a few items in your fellow travelers carry-ons. Read More

Thumbnail Image

Healthcare IT execs fear loss of life due to hacked medical devices or networks

According to Veracode's 'The State of Web and Mobile Application Security in Healthcare,' healthcare IT executives cited 'the potential for loss of life due to compromised networks or medical devices, brand damage due to theft of patient information and regulatory enforcement as their top fears related to such security breaches.' Read More

Thumbnail Image

Hottest Enterprise Networking & IT Startups of 2016

Running timeline of mainly enterprise networking and computing startups that have received funding in 2016 Read More

Thumbnail Image

TSA: Gun discoveries in baggage up 20% in 2015 over 2014

It's an astounding number really, but the details get worse. The TSA goes onto say 2,653 firearms were discovered in carry-on bags at checkpoints across the country, averaging more than seven firearms per day. Of those, 2,198 (83%) were loaded. Firearms were intercepted at a total of 236 airports; 12 more airports than last year. Read More

Thumbnail Image

How much at risk is the U.S.'s critical infrastructure?

Everybody in the security community agrees that it is bad for U.S. critical infrastructure systems to be breached by hostile hackers. But there is ongoing debate about how bad. Some of the nation's leaders warn that skilled hackers could disrupt life as we know it for months or even years. But most cyber security experts say it would be more like hours – days at the worst. Read More

Thumbnail Image

Oracle fixes critical flaws in Java, Database Server

While most of the fixes for Java, Database, and MySQL are run-of-the-mill, four are rated critical if the targeted user has administrator privileges Read More

Thumbnail Image

Google blocked more bad ads than ever in 2015, but they still keep coming

When Google tells us it blocked 780 million bad ads last year, is that a sign that things are getting better? Read More

Thumbnail Image

Data breach numbers still high in 2015

Last year's number of data breaches fell two shy of tying the all-time high of 2014. Read More

Thumbnail Image

Cisco fixes critical flaws in digital encoder, unified computing manager and security appliance

Cisco released security updates to fix a hard-coded root password in its Modular Encoding Platform D9036 and a vulnerable CGI script in the Cisco Unified Computing System (UCS) Manager and the Cisco Firepower 9000 Series appliances. Read More

White Paper: CDW

Protecting Your SaaS Applications

This paper looks at the growing security capabilities of SaaS applications and the efforts by Microsoft to better secure its SaaS offerings through partnerships with third-party cloud and security solution providers. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Best open source email security products

15 big data and analytics companies to watch Read More

Most-Read Stories

1. Super-powered Wi-Fi startup gets $25 million backing from Cisco, Verizon, others
2. Shift to digital business disrupts traditional IT
3. Peeping into 73,000 unsecured security cameras thanks to default passwords
4. The top 5 Hadoop distributions, according to Forrester
5. What does an Oracle audit look like? This one certainly wasn't pretty
6. Unpatched TRENDnet IP cameras still provide a real-time Peeping Tom paradise
7. Data center outages increasingly caused by DDoS
8. 19 free cloud storage options
9. These are the 25 worst passwords of 2015
10. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive