Tuesday, May 3, 2016

Microsoft to begin SHA-1 crypto shutoff with Windows 10's summer upgrade

The Rise of Threat Intelligence Gateways

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

May 03, 2016
Featured Image

Microsoft to begin SHA-1 crypto shutoff with Windows 10's summer upgrade

Microsoft outlined the timetable it will use to drop browser support for sites that secure traffic with SHA-1 certificates, part of an Internet-wide plan to rid the Internet of the weaker encryption. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The Rise of Threat Intelligence Gateways
Cybereason gains Lockheed Martin's Threat Intelligence to thwart cyberattacks
IT leaders pick productivity over security
Ransomware attack forces Michigan utility to shut down systems, phone lines, email
FBI: Ransomware threat at all-time high; how to protect company jewels
Headaches likely to grow over auto cybersecurity concerns
SmartThings security flaws revealed
Match security plans to your company's 'risk appetite'

eGuide: RSA Security Inc

eGuide: Managing Risk in a Complex Environment

This eGuide from CIO, CSO and Network World examines the correlation between effective risk management and profit margin, and what organizations can learn about business resilience from high-profile breaches. It also looks at the state of vendor risk management, the compliance risks of outsourcing IT and the unique challenges facing the healthcare industry. Read More

The Rise of Threat Intelligence Gateways

Network appliances designed to automatically block known threats, mitigate risk, and streamline security operations Read More

Thumbnail Image

Cybereason gains Lockheed Martin's Threat Intelligence to thwart cyberattacks

Cybereason's real time threat detection and remediation combines big data, behavioral analytics, and machine learning with top notch threat intelligence from Lockheed Martin Read More

Thumbnail Image

IT leaders pick productivity over security

Implementing security measures can make systems run slower and essentially bog down productivity, which is causing some enterprises to abandon effective security measures. Two recent studies highlight the severity of lacking cybersecurity practices. Read More

Thumbnail Image

Ransomware attack forces Michigan utility to shut down systems, phone lines, email

Lansing Board of Water & Light (BWL), a Michigan municipal utility, was hit with a new variant of ransomware and had to shut down many of its systems. Read More

Thumbnail Image

FBI: Ransomware threat at all-time high; how to protect company jewels

Ransomware has many names -- Cryptowall, CryptoLocker, Reveton to name a few – and all are bad news for businesses..."Several years ago, ransomware was normally delivered through spam e-mails, but because e-mail systems got better at filtering out spam, cyber criminals turned to spear phishing e-mails targeting specific individuals," the FBI stated. And in newly identified instances of ransomware, some cyber criminals aren't using e-mails at all. "These criminals have evolved over time and now bypass the need for an individual to click on a link. They do this by seeding legitimate websites with malicious code, taking advantage of unpatched software on end-user computers Read More

Thumbnail Image

Headaches likely to grow over auto cybersecurity concerns

But while some short-term fixes may develop, forthcoming government auto cybersecurity standards won't happen until at least 2018. Furthermore, technologies, such as message encryption and authentication, which can be used to secure and verify the legitimacy of communications occurring along in-vehicle networks—cannot be incorporated into existing vehicles. Rather, such technologies must be incorporated during the vehicle design and production process, which according to experts, will take approximately 5 years to complete, Read More

Thumbnail Image

SmartThings security flaws revealed

Researchers developed four proof-of-concept attacks that show how an attacker could take control of SmartThings smart home devices. Read More

Thumbnail Image
INSIDER

Match security plans to your company's 'risk appetite'

CIOs discuss their risk-management strategies for dealing with cybersecurity threats and the aftermath of a data breach. Read More

White Paper: Solutionary Inc

2016 Global Threat Intelligence Report (GTIR)

Get actionable intelligence, guidance about what attackers are doing, and comprehensive security controls designed to disrupt attacks in the 2016 GTIR. Controls recommended in this report will contribute to an organization's survivability and resiliency in the face of an attack. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Highly social Linux nerds worth following

Robots at your service Read More

Most-Read Stories

1. Meet the man behind Ubuntu MATE
2. 19 free cloud storage options
3. Nvidia GPU-powered autonomous car teaches itself to see and steer
4. iPhone 7 may immediately be followed by the iPhone 8
5. VMware cloud boss to leave
6. Peeping into 73,000 unsecured security cameras thanks to default passwords
7. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
8. I am the reason for Apple's falling iPhone sales
9. Microsoft's new service makes app developers out of everyday employees
10. Meet the new Ubuntu: A Linux release tailor-made for enterprises
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive