|
Solution Center: Rapid7 When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More ▶ |
In part two of CSO's interview with Gabe Bassett from Verizon Enterprise Solutions at ShmooCon 2017, Steve Ragan and Bassett discuss why vulnerabilities are not the major vectors that hackers use to get into a company's infrastructure. Watch Now ▶ | |
Around 70 percent of police cameras in Washington D.C. were reportedly unable to record footage for several days before President Trump's inauguration due to a ransomware attack. Read More ▶ | |
|
The defense research agency last March announced Spectrum Collaboration Challenge and said the primary goal of the contest was to infuse radios with "advanced machine-learning capabilities so they can collectively develop strategies that optimize use of the wireless spectrum in ways not possible with today's intrinsically inefficient approach of pre-allocating exclusive access to designated frequencies." Read More ▶ | |
President Trump's executive order on immigration puts non-U.S. citizens' data in jeopardy. Read More ▶ | |
Cybersecurity isn't about one threat or one firewall issue on one computer. It's about zooming out and getting a bigger perspective on what's going on in an IT environment. Read More ▶ | |
Forgot your password? Well, Facebook wants to help you recover your account. The company is releasing an open source protocol that'll let third-party sites recover a user's account through Facebook, or any trusted service. Read More ▶ | |
Trying to filter out phishing emails is tough work, even for organizations trying to find a better way through automation, according to a new study from security software company GreatHorn. Read More ▶ | |
At ShmooCon 2017, CSO's Steve Ragan sits down with Gabe Bassett, senior information security data Scientist at Verizon Enterprise Solutions. The two discuss how attack surfaces work within the Verizon Data Breach Investigations Report (DBIR) and how companies can use those to assess their risk profiles. Watch Now ▶ | |
Video/Webcast: Riverbed Technology Join Robin Gareiss, president and founder, Nemertes Research and David Roberts, director of product management, Riverbed, as they explore the different approaches to monitoring UC-network probes vs endpoint telemetry-and why taking a combined approach helps you monitor quality of experience and more quickly troubleshoot issues Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS 7 (more) security TED Talks you can't miss Read More ▶ |
Most-Read Stories |
0 comments:
Post a Comment