Friday, January 27, 2017

Self-protection is key to Linux kernel security

Has Cisco broken out of the network hardware box?

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jan 27, 2017
Featured Image
INSIDER

Self-protection is key to Linux kernel security

Finding and fixing Linux security vulnerabilities amounts to the usual whack-a-mole. The real solution is to harden the Linux kernel and let it protect itself Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Has Cisco broken out of the network hardware box?
Chrome, Firefox start warning users when websites use insecure HTTP logins
Password-free security uses voice, user behavior to verify identity
A new service for the less techie criminals
Top data breach trends in 2016 — Phishing, skimming rise; hacking holds ground
Gmail will block JavaScript attachments, a common source of malware
Face-off: Oracle vs. CA for identity management
Air Force goes after cyber deception technology
10 of the latest craziest and scariest things the TSA found on your fellow travelers

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Has Cisco broken out of the network hardware box?

Cisco has for a few years now touted software over its hardware powers but with this week's AppDynamics buy it may have broken out of its traditional bailiwick for good. Read More

Thumbnail Image

Chrome, Firefox start warning users when websites use insecure HTTP logins

Chrome and Firefox will warn you when you try to login to a site without HTTPS. Read More

Thumbnail Image

Password-free security uses voice, user behavior to verify identity

Tired of conventional passwords? So is Nuance Communication, a tech firm that is promoting the human voice as a way to secure user accounts. Read More

Thumbnail Image

A new service for the less techie criminals

Aditya K Sood, PhD, Director of Security and Cloud Threat Labs, Blue Coat Systems, a part of Symantec, details how cybercriminals can obtain sensitive data, like credit card numbers, names and addresses, with just a couple of clicks and a payment. Read More

Thumbnail Image
INSIDER

Top data breach trends in 2016 — Phishing, skimming rise; hacking holds ground

In a year marked by massive data breaches, trends report finds skimming and phishing made waves in 2016. Read More

Thumbnail Image

Gmail will block JavaScript attachments, a common source of malware

Starting February 13, Google will no longer allow JavaScript attachments on its Gmail service, killing one of the main methods of malware distribution over the past two years. Read More

Thumbnail Image
INSIDER

Face-off: Oracle vs. CA for identity management

Considering identity and access management (IAM) software? Download this free report for side-by-side comparisons of rival products from Oracle and CA, based on reviews written by enterprise users of the products. Read More

Thumbnail Image

Air Force goes after cyber deception technology

The Air Force Research Lab (AFRL) tapped into that notion today as it awarded a $750,000 grant to security systems developer Galois to develop a cyber deception system that will "dramatically reduce the capabilities of an attacker that has gained a foothold on a network." Read More

Thumbnail Image

10 of the latest craziest and scariest things the TSA found on your fellow travelers

Interestingly the TSA finds some amusement or amazement in these finding as it now posts its own Top 10 Most Unusual Finds which outlines the most "dangerous and often times wacky items" it has kept off commercial airliners. Read More

eBook: Safebreach

Get a Virtual Hacker on Your Squad

Can you answer the question "Are we secure?" If you're only as strong as your security defenses, understanding how well the controls that you've deployed will stand up to attackers is critical. This eBook looks at how breach simulations can quantify your security risks and continuously validate the efficacy of your security controls. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

9 painful ways people hurt themselves with computers/video games

10 amazing Raspberry Pi clusters Read More

Most-Read Stories

1. Game over for Solaris and SPARC?
2. LinkedIn pumps water down to its server racks, uses an interesting spine and leaf network fabric
3. Saudi Arabia again hit with disk-wiping malware Shamoon 2
4. Avaya, in no-brainer, pulls $1 billion IPO in wake of bankruptcy filing
5. Ransomware makes California nursing school feel ill
6. Four lesser-known Wi-Fi security threats and how to defend against them
7. 19 free cloud storage options
8. 7 free tools every network needs
9. Cisco snatches AppDynamics from IPO market
10. That online job candidate may be carrying a virus
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive