7 ways to tighten enterprise social media security

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Dec 09, 2016
Featured Image

Cisco Talos: Zeus spawn “Floki bot” malware gaining use, cyber-underworld notoriety

“[Floki bot] is based on the same codebase that was used by the infamous Zeus trojan, the source code of which was leaked in 2011. Rather than simply copying the features that were present within the Zeus trojan ‘as-is’, Floki Bot claims to feature several new capabilities making it an attractive tool for criminals,” Talos wrote. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

7 ways to tighten enterprise social media security
The Trump effect on cybersecurity: Tough to tell
Fighting ransomware: A fresh look at Windows Server approaches
November 2016: The month in hacks and breaches
Cisco whacks its Secure Access Control System
(From our archives) High tech helps solve mystery of ancient calculator
(From our archives) AT&T: Fall of an icon
Russian cyberspies likely behind DNC breach move on to German election
(From our archives) On the company dime: Rogue game server admins tell all

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

7 ways to tighten enterprise social media security

In this day and age when people share everything, there needs to be constraints in place to keep company secrets off Facebook. Read More

Thumbnail Image

The Trump effect on cybersecurity: Tough to tell

Donald Trump’s effect on cybersecurity after he’s sworn in as president will likely be toward military uses of cyber weapons and stronger tools for law enforcement to crack encryption, but the impact is hard to predict due to the vagueness of his proposals so far. Read More

Thumbnail Image
INSIDER

Fighting ransomware: A fresh look at Windows Server approaches

Make sure your backup files really work -- test them! -- or else they will be no use to you in this situation. Read More

Thumbnail Image
INSIDER

November 2016: The month in hacks and breaches

Here's how the holiday season is heating up for hackers. Read More

Thumbnail Image

Cisco whacks its Secure Access Control System

Cisco this week this week announced the death of its Secure Access Control System – a package customers use to manage access to network resources. Read More

(From our archives) High tech helps solve mystery of ancient calculator

Results of a high-tech research project to be released next week promise to finally unravel much of the remaining mystery of a 2,000-year-old astronomical calculator. Read More

(From our archives) AT&T: Fall of an icon

Interviews with former AT&T insiders, regulators, analysts and other observers concluded one thing: It didn't have to end this way. Read More

Thumbnail Image

Russian cyberspies likely behind DNC breach move on to German election

A group of suspected Russian cyberspies blamed for interring in the U.S. elections is also attempting to influence the upcoming vote in Germany, according to the country’s domestic intelligence agency. Read More

(From our archives) On the company dime: Rogue game server admins tell all

Back in January, Scandinavian gamers hijacked a New Hampshire medical center's server to host "Call of Duty: Black Ops" sessions. When asked about that incident, Stephen Heaslip of the gamer site Blues News told Network World that hackers are not the most likely individuals to commandeer corporate servers for illicit gaming: Such appropriations are more often the work of IT administrators, he said. Read More

White Paper: Jamf

Employee Choice Programs

Technology is integral to everything we do, especially at work. Consequently, employees have preferences for certain device brands and expect to be able to choose those devices at work. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

What’s in store for tech in 2017

20 years ago: Hot sci/tech images from 1996 Read More

Most-Read Stories

1. Just one autonomous car will use 4,000 GB of data/day
2. Say goodbye to MS-DOS command prompt
3. Cisco whacks its Secure Access Control System
4. Thieves using a $17 power amplifier to break into cars with remote keyless systems
5. 7 Linux predictions for 2017
6. Peeping into 73,000 unsecured security cameras thanks to default passwords
7. 19 free cloud storage options
8. Apache Zeppelin open-source analytics startup reveals new name, fresh funding
9. 10 reasons to divorce the cloud
10. How to survive the death of Flash
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.