Network World Security Alert | | | | We tested data loss prevention (DLP) tools from Comodo, Digital Guardian and Forcepoint. These products are designed to stop protected data from being shared in multiple ways, everything from e-mail attachments to printing to even screen captures. See our results. Read More ▶ | | | White Paper: Pure Storage Gartner has done the research for you. Help your organization make an informed IT decision regarding flash storage. Read the 2016 Gartner Magic Quadrant for Solid-State Arrays to gain insights regarding the future state of the storage market and an independent vendor comparison. Also learn why Pure Storage achieved the furthest overall position for completeness of vision. Read More ▶ | Ever dismiss a security alert because you're busy doing something? You're not alone. Read More ▶ | | Big data is best known for its volume, variety and velocity -- collectively referred to as the "3 Vs" -- and all three of those traits make security an elusive goal. Targeting companies grappling with that challenge, the Cloud Security Alliance on Friday released a new report offering 100 best practices. Read More ▶ | | Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make it a lot harder to penetrate enterprise networks. Read More ▶ | | | Incident response is still largely a human response. Multiply an outdated response plan by the many human errors that can innocently occur during response and you have a recipe for potentially cataclysmic results in the threat event aftermath. Use the following tabletop exercises based on today's most disconcerting threats to update your response plan for live action. Read More ▶ | | IT security has a reality distortion field when it comes to perimeter security. IT needs to create a 'Secure Breach' environment to safeguard data. Read More ▶ | | White Paper: Trend Micro Incorporated By now, not only security professionals, but also many knowledge workers and consumers are well aware of the insidious nature of ransomware. As its name implies, ransomware is malicious software that holds data files hostage pending the payment of a ransom, typically with untraceable bitcoin as the currency of choice. Read More ▶ | Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ | SLIDESHOWS Back to school stuff for the discerning techie (or techie-in-training) Read More ▶ | Most-Read Stories | | | |
0 comments:
Post a Comment