Monday, January 25, 2016

REVIEW: Cyphort makes advanced threat protection easier than ever

New tool from Cloudmark is designed to defend against spear phishing  

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jan 25, 2016
Featured Image
INSIDER

REVIEW: Cyphort makes advanced threat protection easier than ever

Over the past few months, we've reviewed a variety of cutting-edge security tools that combat advanced persistent threats (APTs); everything from threat intelligence to virtual sandboxing to privileged identity management. And while all of these programs have been powerful, they all had varying degrees of complexity when it came to usability and customization. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

New tool from Cloudmark is designed to defend against spear phishing  
CIA: 10 Tips when investigating a flying saucer
26 of the craziest and scariest things the TSA has found on travelers
Backdoor account replaced by another backdoor in vendor stumble
Aircraft part manufacturer says cybercrime incident cost it $54 million
Skype now hides your IP address to protect against attacks from online trolls
Defending against insider security threats hangs on trust
FortiGuard SSH backdoor found in more Fortinet security appliances

White Paper: Navisite

7 Steps to Developing a Cloud Security Plan

Security concerns are top-of-mind for IT executives in light of highly publicized data breaches at a wide range of leading enterprises and organizations. Read More

New tool from Cloudmark is designed to defend against spear phishing  

The purpose-built solution is said to detect spear phishing messages before they reach their targets Read More

Thumbnail Image

CIA: 10 Tips when investigating a flying saucer

Most people don't typically associate the Central Intelligence Agency with historical UFO investigations but the agency did have a big role in such investigations many years ago. That's why I thought it was unusual and kind of interesting that the agency this week issued a release called "How to investigate a flying saucer." [The release is also a nod to the fact that the science fiction TV series X-Files returns to the screen this weekend] Read More

Thumbnail Image

26 of the craziest and scariest things the TSA has found on travelers

Sickles, grenades, blasting machines and cannon barrels just a few items in your fellow travelers carry-ons. Read More

Thumbnail Image

Backdoor account replaced by another backdoor in vendor stumble

A vendor of audio visual networking equipment replaced one serious security vulnerability with another in a long line of products, despite being warned of the dangers. Read More

Thumbnail Image

Aircraft part manufacturer says cybercrime incident cost it $54 million

An Austrian airplane component maker for Boeing and Airbus said earlier this week a cybercrime-related fraud has caused it €50 million (US$54 million) in damages. Read More

Thumbnail Image

Skype now hides your IP address to protect against attacks from online trolls

Online gaming can be a nasty business, with some sore losers targeting others to take out their frustrations. Skype recently took action to make that harder. Read More

Thumbnail Image

Defending against insider security threats hangs on trust

If your security strategy only considers malicious insiders when addressing the insider threat, you may be miscalculating the risk. Accidental incidents are nearly impossible to guard against. Read More

Thumbnail Image

FortiGuard SSH backdoor found in more Fortinet security appliances

Network security vendor Fortinet has identified an authentication issue that could give remote attackers administrative control over FortiSwitch, FortiAnalyzer and FortiCache devices. Read More

Video/Webcast: Cloudmark

Cloudmark Trident: Stop Spear Phishing in its Tracks

Of all the attack techniques that menace enterprises today, highly targeted spear phishing emails are probably the most insidious and the hardest to stop. Find out how you can stop spearfishing from impacting your enterprise. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Best open source email security products

15 big data and analytics companies to watch Read More

Most-Read Stories

1. Peeping into 73,000 unsecured security cameras thanks to default passwords
2. Verizon vows to build the first 5G network in the US
3. 26 of the craziest and scariest things the TSA has found on travelers
4. Aircraft part manufacturer says cybercrime incident cost it $54 million
5. Shift to digital business disrupts traditional IT
6. Unpatched TRENDnet IP cameras still provide a real-time Peeping Tom paradise
7. 19 free cloud storage options
8. What does an Oracle audit look like? This one certainly wasn't pretty
9. TSA: Gun discoveries in baggage up 20% in 2015 over 2014
10. New management vendors emerge to control the hybrid cloud
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive