Friday, August 19, 2016

How IT can limit the risk of popular messaging apps

Cisco, Fortinet issue patches against NSA malware

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Aug 19, 2016
Featured Image

How IT can limit the risk of popular messaging apps

CIOs have battled shadow IT for years, long before the advent of messaging apps such as WhatsApp and Facebook Messenger. Here's how a set of IT pros makes the most of the latest challenge. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Cisco, Fortinet issue patches against NSA malware
Alleged NSA data dump contain hacking tools rarely seen
Samsung Galaxy Note7 iris scanner review
NSA zero days and encryption backdoors need clear disclosure policies
Why a security team embraces shadow IT
Americans want passwords, not biometrics, survey finds
Sage data breach highlights the risk of the insider threat
Prize competitions for tough IT, high-tech problems all the rage
Branch office links, big bandwidth needs drive SD-WAN evolution

White Paper: CA Technologies

Breaking the Kill Chain: Stopping Data Breaches with Privileged Access Management

When we consider the current stream of security incidents, it's common to refer back to the Target incident, which began in late 2013. With some 70 million payment card records stolen, Target wasn't the first-or even largest-data breach to take place in history, let alone in 2013. Read More

Thumbnail Image

Cisco, Fortinet issue patches against NSA malware

Customers of Cisco and Fortinet security gear need to check that their versions of specific devices are patched against exploits patch exploits made public this week as a result of a purported hack of NSA malware. Read More

Thumbnail Image

Alleged NSA data dump contain hacking tools rarely seen

A stolen cache of files that may belong to the National Security Agency contains genuine hacking tools that not only work, but show a level of sophistication rarely seen. Read More

Thumbnail Image
Video

Samsung Galaxy Note7 iris scanner review

CIO.com's Al Sacco goes hands on with the Samsung Galaxy Note7 smartphone and its new biometric iris scanner. Watch Now

Thumbnail Image

NSA zero days and encryption backdoors need clear disclosure policies

Disclosure of NSA zero days signals a need for clear policies on when to notify affected vendors. Read More

Thumbnail Image

Why a security team embraces shadow IT

A group within Western Union information security team relies on cloud software, including content management, social collaboration and single sign-on tools to let employees to get their work done while protecting corporate data. Read More

Thumbnail Image

Americans want passwords, not biometrics, survey finds

Fear of leaky organizations storing personal biometric data might be behind the public's preference for passwords over biometry for security. Read More

Thumbnail Image

Sage data breach highlights the risk of the insider threat

A suspect in the recent data breach at Sage, a U.K. provider of business software, has been arrested. On Wednesday, police in London detained a company employee. Read More

Thumbnail Image

Prize competitions for tough IT, high-tech problems all the rage

It has been over six years that the government set the America Competes Act which in combination with Challenge.gov has prompted more than 700 public-sector prize competitions that have doled out more than $80 million in prizes. Read More

Branch office links, big bandwidth needs drive SD-WAN evolution

SD-WAN market heats up as WAN requirements multiply. Read More

White Paper: Fortinet

2016 Security Threat Report: FortiGuard Eye of the Storm

The 2016 Security Threat Report presents threat data analysis and findings to show recent trends in cyber threats. It offers contextual research insights and considerations for mitigating risks associated with cyber threats, and summarizes the implications of cyber threats on current and upcoming 2016 global events. Our hope is that you find meaningful ideas to consider for your security strategy that will help elevate your security posture. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Selfie fits modern politics like a handshake

First Look: Firefox 48 Read More

Most-Read Stories of 2016

1. 19 free cloud storage options
2. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
3. Credibility and trust: Microsoft blows it
4. Peeping into 73,000 unsecured security cameras thanks to default passwords
5. 7 free tools every network needs
6. 9 Common Spanning Tree Mistakes
7. How Forbes inadvertently proved the anti-malware value of ad blockers
8. 6 free network vulnerability scanners
9. 10 biggest home networking mistakes (and how to fix them)
10. Ten operating systems for the Raspberry Pi
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive