AWS tries to protect its customers from DDoS attacks with new service

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Dec 02, 2016
Featured Image

How to architect the network so IoT devices are secure

New and increased traffic patterns from the Internet of Things create security challenges. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

AWS tries to protect its customers from DDoS attacks with new service
20 years ago: Hot sci/tech images from 1996
DARPA gamification plan to get deep-thinkers, game-changers to collaborate
2016’s notable deaths in technology, science & inventions
IBM warns of rising VoIP cyber-attacks
Data-wiping malware strikes Saudi government agencies
Who's responsible for data compliance? 25% of executives don't know
Best practices for lowering cyber insurance costs and cyber risk

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

AWS tries to protect its customers from DDoS attacks with new service

Amazon Web Services is trying to help protect its customers with a new service aimed at mitigating DDoS impacts. It’s called Shield, and the entry-level tier is enabled by default for all web applications running on AWS, starting on Wednesday. Read More

Thumbnail Image

20 years ago: Hot sci/tech images from 1996

As we wind down 2016, we thought it would be fascinating to take a look at what some of the hot topics were 20 years ago. What we found are monkeys in space; a heaping helping of interesting computer news from the old Comdex trade show; Bill Gates in full form and Al Gore with the ENIAC. Take a look back at what was hot in 1996. Read More

Thumbnail Image

DARPA gamification plan to get deep-thinkers, game-changers to collaborate

The agency is proposing an online community known as Gamifying the Search for Strategic Surprise (GS3) that would “apply a unique combination of online game and social media technologies and techniques to engage a large number of experts and deep thinkers in a shared analytic process to rapidly identify, understand, and expand upon the potential implications and applications of emerging science and technology. The program will also develop a mechanism to identify and quickly fund research opportunities that emerge from this collaborative process,” DARPA stated. Read More

Thumbnail Image

2016’s notable deaths in technology, science & inventions

Paying respects to computing pioneers, corporate leaders (AT&T, Intel) and the most inventive of inventors who passed during 2016 Read More

Thumbnail Image

IBM warns of rising VoIP cyber-attacks

IBM says common Session Initiation Protocol (SIP) and SIP and Cisco Skinny Client Control Protocol (SCCP) are most common targets. Read More

Thumbnail Image

Data-wiping malware strikes Saudi government agencies

Saudia Arabia’s government agencies were hit with a cyber attack that security researchers are blaming on a worm-like malware that can wipe computer systems, destroying data. Read More

Thumbnail Image
INSIDER

Who's responsible for data compliance? 25% of executives don't know

A new survey sheds some light on just how little grasp U.S. organizations have on privacy and security regulations. Read More

Best practices for lowering cyber insurance costs and cyber risk

If your cyber insurance vendors offer incentives or discounts for companies who meet high data security and protection standards, they will likely focus on these processes and controls Read More

eBook: Cyber-Ark Software Inc

CyberArk eBook - Achieving Protection and Productivity by Securing Privilege on the Endpoint

Local administrator rights and application control are better together. Removing local administrator rights can mitigate the risk of some endpoint attacks, but not all. For more effective endpoint protection, organizations should employ a combination of privilege management and application control. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Best open source management tools

Network managers should be checking their list twice Read More

Most-Read Stories

1. IBM warns of rising VoIP cyber-attacks
2. Amazon employee jumped from building after sending email to co-workers and CEO
3. Cool tech at AWS re:Invent
4. iPhone 8 said to feature a curved OLED display
5. Goodbye SIEM, hello SOAPA
6. Linux predictions: Which ones came true?
7. 19 free cloud storage options
8. 7 free tools every network needs
9. John Deere leads the way with IoT-driven precision farming
10. The return of the infrastructure engineer
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.