Feds want to set a trail for future AI advances

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Oct 13, 2016
Featured Image

Cisco fashions tactical ransomware defense

Cisco has taken a look at its security capabilities and those of its partners and come up with a playbook to address ransomware. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Feds want to set a trail for future AI advances
10 highest-paying IT security jobs
12 hardware and software vulnerabilities you should address now
The truth about cybersecurity certifications
Federal cyber incidents grew an astounding 1,300% between 2006 and 2015
A night to remember: Engineering lessons from the Titanic

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to “Make Nothing Happen” is really quite exciting. Check out these resources to learn how Rapid7’s threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Feds want to set a trail for future AI advances

Will future developments in the realm of Artificial Intelligence be like the wild west or a more controlled situation? The real answer is probably somewhere in the middle but the government at least would like to see more measured research and development. The White House today issued report on future directions for AI called Preparing for the Future of Artificial Intelligence. Read More

Thumbnail Image

10 highest-paying IT security jobs

IT security is of major concern to all organizations, and they're willing to pay to get top talent. Read More

Thumbnail Image
INSIDER

12 hardware and software vulnerabilities you should address now

Hardware and software that live past their end-of-life dates pose serious risks to organizations. Find out which assets you should update, upgrade or replace ASAP. Read More

The truth about cybersecurity certifications

Beyond the Certified Information Systems Security Professional (CISSP), other certifications are more specialized, esoteric and of marginal value. Read More

Thumbnail Image

Federal cyber incidents grew an astounding 1,300% between 2006 and 2015

“Federal information systems and networks are inherently at risk. They are highly complex and dynamic, technologically diverse, and often geographically dispersed. This complexity increases the difficulty in identifying, managing, and protecting the myriad of operating systems, applications, and devices comprising the systems and networks. Compounding the risk, systems used by federal agencies are often riddled with security vulnerabilities—both known and unknown. For example, the national vulnerability database maintained by the Mitre Corporation has identified 78,907 publicly known cybersecurity vulnerabilities and exposures as of September 15, 2016, with more being added each day,” the GAO wrote. Read More

Thumbnail Image

A night to remember: Engineering lessons from the Titanic

Heeding the lessons of the Titanic can help modern data center engineers avoid and mitigate fateful encounters with unforeseen menaces. Read More

White Paper: Verizon

How Can You Make Better Use of Your Backup Data?

Your IT organization is under a lot of pressure to manage data more efficiently and provide access to it more quickly. Your current tools just can't handle the job. When the CEO's email box is unavailable because a server failed, how quickly can IT get it going again? Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

10 hidden features of Google office apps

Seattle substation is cool enough to draw a crowd Read More

Most-Read Stories

1. 7 Linux command line tools you didn’t know you need
2. Google Graveyard: What Google has killed in 2016
3. Thousands of internet-connected devices are a security disaster in the making
4. Microsoft fleshes out seismic change to Windows patching
5. 19 free cloud storage options
6. Microsoft released 10 patches: 5 rated critical, 5 fixed zero-day flaws
7. 7 free tools every network needs
8. What IT admins love/hate about 8 top network monitoring tools
9. Boost your productivity with these seven apps
10. Wi-Fi vs. LTE could be the start of a mobile rollercoaster
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.