IBM technology creates smart wingman for self-driving cars

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 31, 2017
Featured Image

Cisco issues urgent reboot warning for bug in ASA and Firepower appliances

Cisco says without system reboot the devices will stop passing traffic after 213 days of uptime Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

IBM technology creates smart wingman for self-driving cars
IBM on the state of network security: Abysmal
10 practical privacy tips for the post-privacy internet
IP theft: Declining, or just more stealthy?
Millions of websites affected by unpatched flaw in Microsoft IIS 6 web server
Open-source developers targeted in sophisticated malware attack
VMware patches critical virtual machine escape flaws
Extreme swallows Brocade's data center networking business for $55M
SS8’s time machine is designed to automate the hunt for compromises  

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

IBM technology creates smart wingman for self-driving cars

IBM said that it has patented a machine learning technology that defines how to shift control of an autonomous vehicle between a human driver and a vehicle control processor in the event of a potential emergency. Read More

Thumbnail Image

IBM on the state of network security: Abysmal

IBM says cybercriminals are starting to grab unstructured data, spam has rebloomed 400% and ransomware has just gone nuts Read More

Thumbnail Image

10 practical privacy tips for the post-privacy internet

ISPs and providers can now sell your personal data thanks to the U.S. Congress. Here’s what you can do to maintain your online privacy. Read More

Thumbnail Image

IP theft: Declining, or just more stealthy?

China and the US agreed 18 months ago to stop “knowingly” tolerating economic espionage. According to some studies, the agreement is working. Others aren’t so sure, however. Read More

Thumbnail Image

Millions of websites affected by unpatched flaw in Microsoft IIS 6 web server

A proof-of-concept exploit has been published for a zero-day vulnerability in Microsoft Internet Information Services 6.0, a version of the web server that's no longer supported. Read More

Thumbnail Image

Open-source developers targeted in sophisticated malware attack

Developers who publish their code on GitHub have been targeted in an attack campaign that uses a little known but potent cyberespionage malware. Read More

Thumbnail Image

VMware patches critical virtual machine escape flaws

VMware has released critical security patches for vulnerabilities demonstrated during the recent Pwn2Own hacking contest that could be exploited to escape from the isolation of virtual machines. Read More

Thumbnail Image

Extreme swallows Brocade's data center networking business for $55M

Extreme Networks continued to amass a nice nest of data center technology saying today it would buy Brocade's data center networking business for $55 million in cash from its current owner Broadcom Read More

SS8’s time machine is designed to automate the hunt for compromises  

Company says it can detect and predict where breaches are coming from without the need for human intervention Read More

White Paper: Lookout Mobile Security

Are You Prepared? The Future of Enterprise Mobile Security

As threats to enterprise mobility continue to intensify, the mobile security industry is evolving quickly. In this report, Lookout co-founders John Hering and Kevin Mahaffey share their predictions for what important new changes are coming and how you can best prepare your organization for success. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

First Look: New Apple iPad, red iPhone and iWatch gear

How to stop insider threats Read More

Most-Read Stories

1. Being a Linux user isn't weird anymore
2. Extreme swallows Brocade's data center networking business for $55M
3. Cord cutting is happening. No it's not. Yes it is.
4. IBM on the state of network security: Abysmal
5. Hadoop fails to live up to the promise and the hype
6. Cisco expands wireless reach with access points, management software
7. 18 free cloud storage options
8. F5 to buy Brocade’s virtual ADC business?
9. FAQ: What is 802.11ay wireless technology?
10. Review: PocketCHIP—Super cheap Linux terminal that fits in your pocket
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.