Tuesday, June 14, 2016

Does Microsoft's acquisition of LinkedIn present data privacy risks?

Study: Most companies can't protect confidential documents

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jun 14, 2016
Featured Image

Does Microsoft's acquisition of LinkedIn present data privacy risks?

Will the merger of the "world's leading professional cloud with the world's leading professional network" present privacy or confidentiality risks when personal profile information is integrated across formerly separate entities? Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Study: Most companies can't protect confidential documents
AT&T and Samsung detail security gaps
5 InfoSec concerns for colleges and universities
NASA describes out of this world data glitch that almost finished its planet hunter
Machine learning could help companies react faster to ransomware
Quick Take: Symantec Buys Blue Coat
National Intelligence office wants to perfect the art of security deception

White Paper: Cisco Systems

5 Steps For Securing The Data Center: Why Traditional Security May Not Work

Datacenter admins face a significant challenge: They need to secure the datacenter without compromising the performance and functionality that new datacenter environments enable. Learn about the 5 steps you need to take to secure your data center. Read More

Thumbnail Image

Study: Most companies can't protect confidential documents

A majority of companies don't have the technology in place to keep employees from sharing confidential documents, according to a study released today. Read More

Thumbnail Image

AT&T and Samsung detail security gaps

In a global online survey of 800 enterprises conducted by IDC for AT&T, 60% said they had a security breach in 2015. Of that group, 42% said the breach had a significant negative impact on the business. Read More

Thumbnail Image

5 InfoSec concerns for colleges and universities

Universities and colleges are a prime target for cybercriminals, making information security (InfoSec) a major concern. Read More

Thumbnail Image

NASA describes out of this world data glitch that almost finished its planet hunter

The latest happened in April when Kepler went into "Emergency Mode" which among other things allows for priority access to ground-based communications via NASA's Deep Space Network. NASA noted at the time that the spacecraft is nearly 75 million miles from Earth, making the communication slow. Even at the speed of light, it takes 13 minutes for a signal to travel to the spacecraft and back. Read More

Thumbnail Image

Machine learning could help companies react faster to ransomware

Behavior analytics vendor Exabeam applies machine learning to detect ransomware infections and help companies quickly isolate affected computers before the malware spreads. Read More

Quick Take: Symantec Buys Blue Coat

Great management team and plenty of opportunity but this deal comes with question marks Read More

Thumbnail Image

National Intelligence office wants to perfect the art of security deception

This week the advanced technology developers from the Intelligence Advance Research Projects Activity (IARPA) office put out a Request For Information about how to best develop better denial and deception technologies – such as honeypots or deception servers for example -- that would bolster cyber security. Read More

Video/Webcast: Juniper Networks

7 Trends Impacting Enterprise Campus Networks

Campus networks hold a critical role in enabling the success of the organization. To meet the next set of challenges, campus networks must now provide better capabilities for:

- Next generation mobility with unified wireless
- Effective security in a campus setting
- Improve access and integration with the Cloud Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Cisco's evolution: Technology and branding changes over the years

Father's Day 2016 gift ideas for the discerning geek techie Read More

Most-Read Stories

1. 19 free cloud storage options
2. NASA describes out of this world data glitch that almost finished its planet hunter
3. Hot security startups to watch
4. Four top innovators are leaving Cisco
5. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
6. 7 free tools every network needs
7. Peeping into 73,000 unsecured security cameras thanks to default passwords
8. iPhone 7 Rumor Rollup: beyond WWDC; Deep Blue; sharp-dressed thieves
9. Raspberry Pi news roundup: Some burgers to go with that Pi?
10. Father's Day 2016 gift ideas for the discerning geek techie
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive