|
White Paper: Palo Alto Networks Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims' machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. Read More ▶ |
It's the time of year for tech predictions. We've rounded up a slew of ideas from industry watchers who track IT budgets, cybersecurity, hiring, infrastructure management, IoT, virtual reality and more. Here are their predictions, projections and prognostications. Read More ▶ |
|
Using a combination of mixed reality displays and 3D cameras, users of Microsoft's "Holoportation" technology can interact with remote participants as if they were in the same physical space. Watch Now ▶ |
|
|
Hiring is a challenge for CIOs, and it won’t get much easier in the coming year, particularly for IT departments that are trying to fill key security and networking roles. Read More ▶ |
|
Pundits who got it wrong explain why ... or deny that they did Read More ▶ |
|
The next major version of OpenVPN, one of the most widely used virtual private networking technologies, will be audited by a well known cryptography expert. Read More ▶ |
|
Looking to bolster its cloud analytics and machine learning technologies, Juniper today announced its intention to buy startup AppFormix for an undisclosed amount. AppFormix brings streaming analytics and machine learning technologies to Juniper that are tailored for managing operations of large OpenStack and Kubernetes-based Hybrid clouds and Network Function Virtualization (NFV)/Telco clouds, wrote Ankur Singla, Juniper’s Vice President, Office of the CTO in a blog about the acquisition Read More ▶ |
|
Parental perks are aimed at attracting more diverse workforce Read More ▶ |
|
Deciding on a new or updated virtual private network (VPN) solution can be intimidating, but it shouldn’t be. Businesses need fast decisions on network infrastructure, but making a bet in the midst of rapid technology advances can have a paralyzing impact. Read More ▶ |
|
IT isn't happy about the shift to decentralized IT management, so VMware tries to provide the best of both worlds: developer flexibility and centralized IT. Read More ▶ |
|
Video/Webcast: Keeper Security Passwords are the most basic form of protection, yet they are also the most susceptible to outside hacking because of poor employee practices. Whether employees write them down, simplify them, or neglect to change them, passwords are an easy target for outside hacking. This video discusses password best practices, and what an companies can do to manage their employees password. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS 20 years ago: Hot sci/tech images from 1996 Read More ▶ |
Most-Read Stories |