Wednesday, August 3, 2016

Hot products at Black Hat 2016

Adding human experts to IT security with Red Canary

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Aug 03, 2016
Featured Image

Hot products at Black Hat 2016

One of the biggest infosec conferences of the year will have these products on display from Las Vegas. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Adding human experts to IT security with Red Canary
They're back! Car hackers take control of Jeep's steering and braking
IRS warns on super summer scam scourge
Russia hacks, plunders the U.S. No bullets fired
This tiny device can infect point-of-sale systems and unlock hotel rooms
Kill a smartphone password with a scan of your eye
White House, NSF, NASA tout ambitious drone application plans

White Paper: Fastly

What to Look for When Choosing a CDN for DDoS Protection

DDoS threats have been around for a long time, and there are multiple ways to address them. Between traditional DDoS appliances, cloud-based mitigation services and hybrid solutions, how do you decide which solution is right for you? In this paper we'll cover the strengths and weaknesses of each approach. Read More

Thumbnail Image

Adding human experts to IT security with Red Canary

Red Canary receives $6.1 million in Series A funding. Its product covers the security lifecycle of data collection, detection of risks, investigation and response. Read More

Thumbnail Image

They're back! Car hackers take control of Jeep's steering and braking

Charlie Miller and Chris Valasek show how an attack can take control of steering, press the gas pedal and even kill the brakes while the vehicle is driving at high speeds. Read More

Thumbnail Image

IRS warns on super summer scam scourge

IRS sees increased automated calls and new tactics from scammers demanding tax payments on iTunes and other gift cards. Read More

Thumbnail Image

Russia hacks, plunders the U.S. No bullets fired

Russia has invaded the U.S. and assaulted the U.S. presidential election, and they haven't fired a single shot—because no bullets are necessary to hack systems security. Read More

Thumbnail Image

This tiny device can infect point-of-sale systems and unlock hotel rooms

Millions of point-of-sale systems and hotel room locks can be hacked by temporarily placing a small, inexpensive device several inches away from their card readers. Read More

Thumbnail Image

Kill a smartphone password with a scan of your eye

The hardware and software to make iris scanning a key feature is now in place for smartphones and PCs. Read More

Thumbnail Image

White House, NSF, NASA tout ambitious drone application plans

The National Science Foundation will devote $35 million in research funding over the next five years to accelerate the safe, intelligent, design and control of unmanned aircraft applications. The announcement was part of a wide-ranging White House Office of Science and Technology Policy proclamation to, as it said, promote the safe integration and innovative adoption of unmanned aircraft systems across the United States. Read More

White Paper: PC Pitstop

Strong Security Needs Flexible Software Tools

It is being said that data security is back on top of the boardroom agenda for 2016. But the truth is it never actually went away. US companies need to figure out what to invest in to give themselves the best chance of avoiding breaches and data loss. And that is a decision which is far from easy given the constant onslaught from new and existing threats and the diverse range of security solutions designed to stop them. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Superman VR roller coaster in pictures

25 surprising facts about Google Read More

Most-Read Stories

1. 200M Yahoo accounts go up for sale on digital black market
2. iPhone 7 release date and pre-order date leaked
3. How to solve Windows 10 crashes in less than a minute
4. If Apple's Irish tax loophole is a fraud, the whole tech industry is guilty
5. Four US firms rule the world's cloud infrastructure
6. 19 free cloud storage options
7. Top VCE exec: We're staying tight with Cisco
8. The CIA, NSA and Pokémon Go
9. FCC settlement with Wi-Fi router maker a win for open source advocates
10. JavaScript keeps its spot atop programming language rankings
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive