More code deploys means fewer security headaches

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jun 24, 2016
Featured Image

Arista infringes on Cisco networking patents, trade agency says

In a move that could lead to a ban on selling its products in the United States, the US International Trade Commission has ruled that Arista does in fact infringe on a number of Cisco’s technology patents. Arista now must decide if it wants to ask the US government to overturn the so-called “import ban” or ask that an appeals court toss the decision, observers say. It could also decide to build products in the US – a move that Cisco says would “not only would violate the ITC orders, but the federal court has the authority to enjoin local manufacturing of infringing products.” Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

More code deploys means fewer security headaches
10 steps the IRS needs to take now to secure tax returns, fight fraud, identity theft
IBM Watson/ XPrize open $5 million AI competition for world-changing applications
A look inside the Microsoft Local Administrator Password Solution
Microsoft: Government's data gag order practices worse than first thought
The number of corporate users hit by crypto ransomware is skyrocketing
Gartner’s top 10 security predictions
154 million American voters' records exposed thanks to unsecured database
AWS, Microsoft cloud win US government security approval

White Paper: RES Software

4 Desktop Disruptions: The Computing Workspace As We Know It Will Never Be The Same

As organizations strategize to best support their dynamic workforce, there are some important technologies trends that IT should have on their radar so projects don't sneak up on them. Learn how IT can prepare for Windows 10, Office 365 and more. Read More

Thumbnail Image

More code deploys means fewer security headaches

Contrary to what you might think, updating code a lot can cut security issues in half -- and improve software quality Read More

Thumbnail Image

10 steps the IRS needs to take now to secure tax returns, fight fraud, identity theft

The key IRS advisory group, The Electronic Tax Administration Advisory Committee issued its annual state of the agency report this week that concluded: The erosion of the IRS tax system’s integrity from the proliferation of tax identity theft and inadequate levels of taxpayer service at the IRS caused by an antiquated customer service model that does not adequately apply digital service tools. Read More

Thumbnail Image

IBM Watson/ XPrize open $5 million AI competition for world-changing applications

According to IBM and XPrize, the four-year competition aims to “accelerate adoption of AI technologies, and spark creative, innovative and audacious demonstrations of the technology that are truly scalable and solve societal grand challenges. Read More

Thumbnail Image
INSIDER

A look inside the Microsoft Local Administrator Password Solution

Finally, a way around the problem of administrator passwords that are identical across machines, just waiting to be scooped up in pass-the-hash-attacks. Read More

Thumbnail Image

Microsoft: Government's data gag order practices worse than first thought

Microsoft has significantly upped the tally of U.S. government gag orders slapped on demands for customer information. Read More

Thumbnail Image

The number of corporate users hit by crypto ransomware is skyrocketing

The prevalence of ransomware programs, both those that encrypt data and those that don't, has exploded over the past two years, with companies being increasingly targeted. Read More

Thumbnail Image

Gartner’s top 10 security predictions

Gartner has taken a look at five key areas of security concern that businesses face this year and issued predictions on and recommendations about protecting networks and data from threats that will likely arise in each. Read More

Thumbnail Image

154 million American voters' records exposed thanks to unsecured database

Yet another leak, this time it was a database containing the records of 154 million U.S. voters; accessing it required no password or any authentication. Read More

Thumbnail Image

AWS, Microsoft cloud win US government security approval

Three vendors, including Microsoft and Amazon Web Services, have won a key U.S. government authorization that will allow federal agencies to put highly sensitive data on the cloud-computing services. Read More

White Paper: Aruba, an HP Enterprise Company

8 Best Practices to Protect Your Enterprise Network

Mobile and IoT devices such as laptops, smartphones, and smart watches can now be found in most businesses, as users demand access to the corporate network from anywhere, anytime. Securing for BYOD is a conversation IT needs to have, but it doesn't have to be a painful one. Employ these 8 best practices to boost your network security and end those headaches for good. Read More

Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.