Thursday, March 3, 2016

How much security can you turn over to AI?

The IoT liability jumble

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 03, 2016
Featured Image

How much security can you turn over to AI?

Machine learning and behavioral analytics could help you detect attacks faster – or stop them before they even start. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The IoT liability jumble
Attorney general and NSA director pitch cyber-security industry for cooperation
NSA asks Silicon Valley to help fight cybercrime, terrorism
IRS warns of nasty W-2 phishing scheme
How sound-fingerprinting could spot grid attackers
Microsoft defends PCs, post network penetration
Energy Dept. sets 9 finalists for $2.25M wave energy prize
RSA: Geolocation shows just how dead privacy is

White Paper: Cisco Systems

5 Steps For Securing The Data Center: Why Traditional Security May Not Work

Datacenter admins face a significant challenge: They need to secure the datacenter without compromising the performance and functionality that new datacenter environments enable. Learn about the 5 steps you need to take to secure your data center. Read More

Thumbnail Image

The IoT liability jumble

The endless complexity of the Internet of Things extends to legislative and regulatory efforts to manage its security. A legal panel at the RSA conference said effective standards and management of legal liability issues are likely years away. Read More

Thumbnail Image

Attorney general and NSA director pitch cyber-security industry for cooperation

U.S. Cyber Command chief and NSA director Admiral Michael Rogers and United States Attorney General Loretta Lynch both took the stage at the RSA Security Conference in San Francisco yesterday to appeal for cooperation with the cyber-security industry. Read More

Thumbnail Image

NSA asks Silicon Valley to help fight cybercrime, terrorism

The NSA is too big and slow to effectively fight ingenious cyber attacks without the help of Silicon Valley tech expertise, so it's time to patch up relations between the two, the head of the NSA told a gathering of tens of thousands at RSA Conference 2016. Read More

Thumbnail Image

IRS warns of nasty W-2 phishing scheme

The IRS said the scheme has claimed several victims as payroll and human resources offices mistakenly email payroll data including Forms W-2 that contain Social Security numbers and other personally identifiable information to cybercriminals posing as company executives. Read More

Thumbnail Image

How sound-fingerprinting could spot grid attackers

Like a human's voice box, electrical equipment creates unique sounds. Scientists think those identifiers could be used to look for industrial control attacks. IoT could be a beneficiary, too. Read More

Thumbnail Image

Microsoft defends PCs, post network penetration

Because sometimes bad things happen, Microsoft is bringing the security fight inside. Read More

Thumbnail Image

Energy Dept. sets 9 finalists for $2.25M wave energy prize

The US Department of Energy said it has whittled 92 teams down to 9 finalists for its competition that aims to double the current amount of energy captured from ocean waves. Each of the finalists in the Wave Energy Prize and two alternates will now receive seed DOE funding to develop a 1/20th-scale model of their deep water wave energy converter (WEC) devices. The final round of testing will take place this summer at the nation's most advanced wave-making facility—the Naval Surface Warfare Center's Maneuvering and Seakeeping Basin in Carderock, Maryland. Read More

Thumbnail Image

RSA: Geolocation shows just how dead privacy is

Attorney David Adler spells out how the collection of geolocation data makes invasion of personal privacy easy and incredibly detailed. Read More

White Paper: Cisco Systems

Addressing Advanced Email Threats: Protect Your Data and Brand

Email Attacks have become increasingly complex and sophisticated. To combat threats, Cisco email security solutions deliver advanced threat defense, superior data security, and simplified management. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

7 cheap alternatives to the Microsoft Surface

Apple v. FBI – Who's for, against opening up the terrorist's iPhone Read More

Most-Read Stories

1. Cautionary tale: What happens after daring elite hackers
2. Cisco enters storage, hyperconvergence market with data center splash
3. Microsoft separates Windows 10 Mobile updates from firmware
4. Crypto dream team Diffie & Hellman wins $1M "Nobel Prize of Computing"
5. IRS warns of nasty W-2 phishing scheme
6. Hot security products at RSA 2016
7. Amazon just made it easier to get data OUT of its cloud
8. 19 free cloud storage options
9. Cisco flexes some data center muscle at Partner Summit 2016
10. Elementary boss watches the Linux distro make great strides
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive