Tuesday, February 28, 2017

What's your risk?/

Google shifts on email encryption tool, leaving its fate unclear

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Feb 28, 2017
Featured Image
INSIDER

Big 3 endpoint vendors battle glitzy startups at RSAC

Three of the original anti-virus vendors – Symantec, McAfee and Trend Micro – were out in full force at the show as well, scoffing at the unproven point products of the startups and touting their own reorganizations, renewed focus and broad product portfolios. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Google shifts on email encryption tool, leaving its fate unclear
What should an insider risk policy cover?
(2015) Watching a 'Swatting' slowly unfold within sight of the Boston Marathon starting line
Who should be on an insider risk team?
Down the rabbit hole, part 7: How to limit personal data collection from city cameras
(2007) Behind the scenes of MIT's network
5 ecommerce fraud predictions for 2017
Cog Systems offers more secure version of HTC A9 smartphone
SHA-1 collision can break SVN code repositories

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Google shifts on email encryption tool, leaving its fate unclear

Google is asking developers to take over its effort to make end-to-end email encryption more user friendly, raising questions over whether it'll ever become an official feature in the company's products. Read More

Thumbnail Image
INSIDER

What should an insider risk policy cover?

To protect from liability concerns, enterprises need something in writing so that everyone knows what to do upon finding an insider threat. Here are some suggestions from security experts. Read More

Thumbnail Image

(2015) Watching a 'Swatting' slowly unfold within sight of the Boston Marathon starting line

The instant a bystander told me what he had heard, I knew this police operation was almost certainly the result of a hoax known as Swatting. Read More

Thumbnail Image

Who should be on an insider risk team?

Catching an insider taking confidential information doesn't happen by chance, and policies and procedures must be in place to know what to do when an insider is caught. Read More

Thumbnail Image

Down the rabbit hole, part 7: How to limit personal data collection from city cameras

You have three options to maintain your privacy and limit data collection from city cameras. None, however, provides 100% privacy. Read More

(2007) Behind the scenes of MIT's network

Massachusetts Institute of Technology Network Manager/Security Architect Jeff Schiller is leaning back in a plum-colored recliner in his office, but he isn't relaxing. The victim of a back problem that has forced him to forgo a more traditional office chair for now, the 25-year MIT network veteran has more than enough to do, with the school forging ahead with several major network projects, including a massive VoIP rollout and its foray as a regional fiber-optic network operator. Schiller covered the gamut in a recent interview with Network World Executive News Editor Bob Brown. Read More

Thumbnail Image

5 ecommerce fraud predictions for 2017

Ecommerce fraud is on the rise as more consumers turn to online shopping. Luckily, by being vigilant, merchants can fight fraud and win. Read More

Thumbnail Image

Cog Systems offers more secure version of HTC A9 smartphone

It sounds like a smartphone user's worst fear: Software that starts up before the phone's operating system, intercepting and encrypting every byte sent to or from the flash memory or the network interface. This is not some new kind of ransomware, though, this is the D4 Secure Platform from Cog Systems. Read More

Thumbnail Image

SHA-1 collision can break SVN code repositories

The recently announced SHA-1 collision attack has the potential to break code repositories that use the Subversion (SVN) revision control system. Read More

Research/Infographic: ITS Partners

10 Examples of Employee Behaviors in the Cloud That Can Increase Risk

Every CISO knows that cloud apps are being used by employees. Some are approved apps but most are not. What every CISO doesn't know is the full extent of the actions employees are taking in those cloud apps and how those actions introduce risk. We've summarized the top risky actions employees are taking in an infographic you should print and post on your door. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

5 things to think about for industrial IoT readiness

11 low-tech, decidedly cool cars Read More

Most-Read Stories

1. Four mindblowing Ted Talks for techies
2. Apple Watch Series 3 Rumor Rollup: New display, more energy & WatchOS beta 32
3. Battle of the clouds: Amazon Web Services vs. Microsoft Azure vs. Google Cloud platform
4. Ransomware attacks targeted hundreds of MySQL databases
5. Stop using SHA1: It's now completely unsafe
6. 19 free cloud storage options
7. Google cloud debuts Intel's latest Skylake processors
8. iPhone 7 Plus catches fire and melts in crazy new video
9. Three technologies that could demolish slow internet
10. How Google reinvented security and eliminated the need for firewalls
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive