Tuesday, January 31, 2017

Cisco and IBM on Blockchain; How most hackers enter

How most hackers get into systems

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jan 31, 2017
Featured Image

Cisco fosters Blockchain protocol development, IBM shows why technology could relieve security anxiety

Cisco has helped form a consortium to develop blockchain that could secure Internet of Things applications and more while new study by IBM shows why the technology could become invaluable for businesses worldwide. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How most hackers get into systems
Ransomware disrupts Washington DC's CCTV system
DARPA picks 30 contenders to battle in wireless spectrum competition
Harbinger of The Great Internet Wall arrives
How to practice cybersecurity (and why it's different from IT security)
Facebook tries to revamp password recovery by supplanting email
Spear phishing tough to block, even when using automation tools
Managing risk by understanding attack surfaces

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image
Video

How most hackers get into systems

In part two of CSO's interview with Gabe Bassett from Verizon Enterprise Solutions at ShmooCon 2017, Steve Ragan and Bassett discuss why vulnerabilities are not the major vectors that hackers use to get into a company's infrastructure. Watch Now

Thumbnail Image

Ransomware disrupts Washington DC's CCTV system

Around 70 percent of police cameras in Washington D.C. were reportedly unable to record footage for several days before President Trump's inauguration due to a ransomware attack. Read More

Thumbnail Image

DARPA picks 30 contenders to battle in wireless spectrum competition

The defense research agency last March announced Spectrum Collaboration Challenge and said the primary goal of the contest was to infuse radios with "advanced machine-learning capabilities so they can collectively develop strategies that optimize use of the wireless spectrum in ways not possible with today's intrinsically inefficient approach of pre-allocating exclusive access to designated frequencies." Read More

Thumbnail Image

Harbinger of The Great Internet Wall arrives

President Trump's executive order on immigration puts non-U.S. citizens' data in jeopardy. Read More

Thumbnail Image

How to practice cybersecurity (and why it's different from IT security)

Cybersecurity isn't about one threat or one firewall issue on one computer. It's about zooming out and getting a bigger perspective on what's going on in an IT environment. Read More

Thumbnail Image

Facebook tries to revamp password recovery by supplanting email

Forgot your password? Well, Facebook wants to help you recover your account. The company is releasing an open source protocol that'll let third-party sites recover a user's account through Facebook, or any trusted service. Read More

Thumbnail Image

Spear phishing tough to block, even when using automation tools

Trying to filter out phishing emails is tough work, even for organizations trying to find a better way through automation, according to a new study from security software company GreatHorn. Read More

Thumbnail Image
Video

Managing risk by understanding attack surfaces

At ShmooCon 2017, CSO's Steve Ragan sits down with Gabe Bassett, senior information security data Scientist at Verizon Enterprise Solutions. The two discuss how attack surfaces work within the Verizon Data Breach Investigations Report (DBIR) and how companies can use those to assess their risk profiles. Watch Now

Video/Webcast: Riverbed Technology

Achieving End to End UC Visibility

Join Robin Gareiss, president and founder, Nemertes Research and David Roberts, director of product management, Riverbed, as they explore the different approaches to monitoring UC-network probes vs endpoint telemetry-and why taking a combined approach helps you monitor quality of experience and more quickly troubleshoot issues Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Top 10 technology colleges and universities

7 (more) security TED Talks you can't miss Read More

Most-Read Stories

1. Game over for Solaris and SPARC?
2. Avaya: How we arrived at Chapter 11
3. 19 free cloud storage options
4. As Baby Boomers retire, the shortage of mainframe professionals grows more acute
5. Has Cisco broken out of the network hardware box?
6. LinkedIn pumps water down to its server racks, uses an interesting spine and leaf network fabric
7. Apple iOS 10.3 beta 1 packs a wallop; iOS 11 rumors heat up
8. Raspberry Pi roundup: Here comes Google (kinda, probably), Competitor Corner and sounds of Pi-lence
9. 7 free tools every network needs
10. Guy who swore off smartphones tries to use a smartphone
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:03 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive