Infosec mourns over Howard Schmidt, who helped make the country a safer place

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 07, 2017
Featured Image

7 ways to improve your Joomla security

Follow these steps to secure your Joomla website and protect its visitors. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Infosec mourns over Howard Schmidt, who helped make the country a safer place
Fileless Powershell malware uses DNS as covert communication channel
Microsoft paying a bug bounty of $30,000
New products of the week 3.6.17
Should police departments be able to have their own DNA databases?
(ICYMI) You broke the network. Do you confess?
Robots are malfunctioning, hurting people
Consumer Reports to grade tech products on security, privacy
U.S. Marshals warn against dual phone scams

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Infosec mourns over Howard Schmidt, who helped make the country a safer place

Howard Schmidt advised both President Brack Obama and George W. Bush on cybersecurity. He was a CSO at Microsoft and a CISO at eBay. He led several industry groups, and wrote books on cybersecurity. But when security professionals remember him, it is not so much for his technical accomplishments as for the impact he had on the people around him. He is remembered as a mentor, a communicator, and an educator Read More

Thumbnail Image

Fileless Powershell malware uses DNS as covert communication channel

Targeted attacks are moving away from traditional malware to stealthier techniques that involve abusing standard system tools and protocols that are less frequently monitored. Read More

Thumbnail Image

Microsoft paying a bug bounty of $30,000

Microsoft doubles its bug bounty to up to $30,000 for serious bugs in certain Microsoft services. The bounty runs through May 31, 2017. Read More

Thumbnail Image

New products of the week 3.6.17

Our roundup of intriguing new products from companies such as Sophos and GitHub. Read More

Thumbnail Image

Should police departments be able to have their own DNA databases?

Critics argue that police are creating their own DNA databases to get around regulations. Read More

Thumbnail Image

(ICYMI) You broke the network. Do you confess?

Today we’re taking a deep look into mindset of the network professional – his or her soul -- when it comes to breaking something and owning up to the mistake … or not. Read More

Thumbnail Image

Robots are malfunctioning, hurting people

Robot-related incidents include malfunctioning machines that sometimes hurt people, according to security consultant IOActive. Read More

Thumbnail Image

Consumer Reports to grade tech products on security, privacy

Consumer Reports, a major source for gadget reviews in the U.S., plans to start rating tech products on data security and privacy. Read More

Thumbnail Image

U.S. Marshals warn against dual phone scams

The U.S Marshals are warning the public not to respond to two recent scams involving people fraudulently posing as Marshals making calls across the country. The first is a warning about a scam where the fraudster calls members of the public and alleging they, or their family members, have an active federal arrest warrant and demanding payment of fines. Read More

White Paper: GlobalSCAPE

5 Rings of Data Integration Hell

Dante's "9 Circles of Hell" depicts a journey characterized by increasing levels of an individual's depravity, and presumably, increased levels of punishment. There are corollaries when it comes to addressing data integration issues in your environment that, when not properly addressed, create severe levels of "anguish" on a daily basis. Compounded, these issues can affect company efficiency, profitability, and tenure in your current position. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

10 killer Raspberry Pi projects (Collection 1)

Coolest new Android phones at Mobile World Congress 2017 Read More

Most-Read Stories

1. AMD's Ryzen processor forces hefty price cuts from Intel
2. 13 reasons not to use Chrome
3. How to remotely control your Windows 10 computer via Google Chrome
4. AWS says a typo caused the massive S3 failure this week
5. Safari browser sheds users, mimicking IE
6. 10 killer Raspberry Pi projects (Collection 1)
7. Iraqi hacker takes credit for hijacking subdomain, defacing Trump site
8. Trump broke his H-1B promise. Now what?
9. Avaya wants out of S.F. stadium suite, not too impressed with 49ers either
10. 19 free cloud storage options
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.