|
White Paper: CA Technologies When we consider the current stream of security incidents, it's common to refer back to the Target incident, which began in late 2013. With some 70 million payment card records stolen, Target wasn't the first-or even largest-data breach to take place in history, let alone in 2013. Read More ▶ |
Customers of Cisco and Fortinet security gear need to check that their versions of specific devices are patched against exploits patch exploits made public this week as a result of a purported hack of NSA malware. Read More ▶ | |
A stolen cache of files that may belong to the National Security Agency contains genuine hacking tools that not only work, but show a level of sophistication rarely seen. Read More ▶ | |
CIO.com's Al Sacco goes hands on with the Samsung Galaxy Note7 smartphone and its new biometric iris scanner. Watch Now ▶ | |
|
Disclosure of NSA zero days signals a need for clear policies on when to notify affected vendors. Read More ▶ | |
A group within Western Union information security team relies on cloud software, including content management, social collaboration and single sign-on tools to let employees to get their work done while protecting corporate data. Read More ▶ | |
Fear of leaky organizations storing personal biometric data might be behind the public's preference for passwords over biometry for security. Read More ▶ | |
A suspect in the recent data breach at Sage, a U.K. provider of business software, has been arrested. On Wednesday, police in London detained a company employee. Read More ▶ | |
It has been over six years that the government set the America Competes Act which in combination with Challenge.gov has prompted more than 700 public-sector prize competitions that have doled out more than $80 million in prizes. Read More ▶ | |
SD-WAN market heats up as WAN requirements multiply. Read More ▶ | |
White Paper: Fortinet The 2016 Security Threat Report presents threat data analysis and findings to show recent trends in cyber threats. It offers contextual research insights and considerations for mitigating risks associated with cyber threats, and summarizes the implications of cyber threats on current and upcoming 2016 global events. Our hope is that you find meaningful ideas to consider for your security strategy that will help elevate your security posture. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS First Look: Firefox 48 Read More ▶ |
Most-Read Stories of 2016 |
0 comments:
Post a Comment