Gartner: Artificial intelligence, algorithms and smart software at the heart of big network changes

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Oct 18, 2016
Featured Image
INSIDER

Check Point SandBlast takes endpoint protection to another level

Check Point has long been known as a firewall company but it is reaching beyond its roots with a new series of protective technologies under its SandBlast line. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Gartner: Artificial intelligence, algorithms and smart software at the heart of big network changes
Air Force gets space telescope that can see space objects like no ground-based system before it
Secret Service IT security lambasted by Homeland Security inspector general
Roqos Core router combines cybersecurity with parental controls
5 tools for making sense of system logs
Cybersecurity Canon book review: There Will Be Cyberwar

Video/Webcast: Security Compliance Corporation

Automate User Access Reviews and Account Terminations

Automate your entire entitlement review process in 45 minutes. During this fast-paced webinar, we will highlight the speed and simplicity of Access Auditor and Access Manager. In less time than a typical lunch break, we will show how to unwind this cumbersome task. Read More

Thumbnail Image

Gartner: Artificial intelligence, algorithms and smart software at the heart of big network changes

“CIOs will participate in the building of a new digital platform with intelligence at the center,” Sondergaard said told a crowd of more than 8,000 CIOs and IT leaders. “The new competitive differentiator is understanding the customer’s intent through advanced algorithms and artificial intelligence. Creating new experiences that solve problems customers didn’t realize they had.” Read More

Thumbnail Image

Air Force gets space telescope that can see space objects like no ground-based system before it

The DARPA-developed Space Surveillance Telescope (SST) will this week get a new permanent home at the Air Force Space Command where it promises to rapidly bolster the nation’s ability to more quickly spot and track faint objects in space. Read More

Thumbnail Image

Secret Service IT security lambasted by Homeland Security inspector general

Further from the report: “US Secret Service systems and data remain vulnerable to unauthorized access and disclosure. As discussed, contributing factors included inadequate system security plans, systems with expired authorities to operate, inadequate access and audit controls, noncompliance with logical access requirements, inadequate privacy protections, and over-retention of records. Such deficiencies increase risks to the confidentiality, integrity, and availability of mission- critical information systems and data.” Read More

Thumbnail Image

Roqos Core router combines cybersecurity with parental controls

Wi-Fi router straddles line between consumer-friendly and advanced networking. Read More

Thumbnail Image
INSIDER

5 tools for making sense of system logs

Security and systems administrators discuss the best and worst features of log management products such Splunk, ArcSight and LogRhythm. Read More

Cybersecurity Canon book review: There Will Be Cyberwar

Richard Stiennon’s book There Will Be Cyberwar is a good read for those interested in the intersection of network-centric warfare and security vulnerabilities. Read More

White Paper: Security Compliance Corporation

Success Criteria for Entitlement Reviews

User access reviews are typically very time-consuming, subject to changing regulations and auditor requirements. We reveal the six most important success criteria for identity governance tools and how to automate this labor-intensive process. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Google Graveyard: What Google has killed in 2016

7 Linux command line tools you didn’t know you need Read More

Most-Read Stories

1. President Obama targets nasty space weather response with Executive Order
2. Winners and losers from the big AWS-VMware pact
3. 19 free cloud storage options
4. The case against the VMware-AWS deal
5. elementary OS 0.4: Review and interview with the founder
6. Linux command line tools you didn’t know you need
7. Google Graveyard: What Google has killed in 2016
8. 7 free tools every network needs
9. Survey says many companies want to phase out password
10. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.