Network World Security Alert | | | | Perhaps the biggest surprise in our review of nine multi-factor authentication products is that physical tokens are making a comeback. Many IT managers were hoping that software-based tokens, which are easier to deploy and manage, would make hardware tokens extinct. Read More ▶ | | | White Paper: Hewlett Packard Enterprise The enterprise attack surface continues to expand. Network borders are evaporating as data scatters across cloud, mobile, remote, and partner and other third-party environments. Multiple entry points into the network have appeared, prompting sophisticated data thieves to unite globally and create pro table data-theft businesses. How are companies coping? Read More ▶ | Not that summer time has anything to do with it but the FBI's Internet Crime Complaint Center (IC3) warned that e-mail extortion campaigns and the tedious tech support scams have heated up in recent weeks. Read More ▶ | | New 'smart' tokens and risk-based factors deliver tighter security, but setups remain complex and user interfaces need a facelift. Read More ▶ | | Dangerous threats and new requirements persuading organizations to collect, process, and analyze more and more network telemetry and threat intelligence Read More ▶ | | | The two-factor authentication market has moved toward what is now being called multi-factor authentication. One of the key features being new types of hardware-based tokens. Here are individual reviews of nine MFA products. Read More ▶ | | Military health official warns that cyber hygiene falls short in health IT. Healthcare data breaches have hit more than nine out of 10 organizations in the field. Read More ▶ | | The FBI says that the so-called business e-mail compromise scam has caused $2.3 billion in losses to 17,642 business and non-profit organizations in the U.S. and other countries since October 2013, with the number of victims nearly tripling since January 2015. Read More ▶ | | Researchers with the Defense Advanced Research Projects Agency (DARPA) have quickly moved to alter the way the military, public and private enterprises protect their networks from high-and low-speed distributed denial-of-service attacks with a program called Extreme DDoS Defense (XD3). Read More ▶ | | White Paper: Navisite Security concerns are top-of-mind for IT executives in light of highly publicized data breaches at a wide range of leading enterprises and organizations. Read More ▶ | Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ | SLIDESHOWS 10 cool connected car features Read More ▶ | Most-Read Stories | | | |
0 comments:
Post a Comment