Check Point boosts cloud-security education to help IT security pros stay relevant

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

May 11, 2017
Featured Image

Cisco patches critical IOS security fault found after CIA WikiLeaks dump

Cisco this week said it patched a critical vulnerability in its widely deployed IOS software that was disclosed in the WikiLeaks dump of CIA exploits earlier this year. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Check Point boosts cloud-security education to help IT security pros stay relevant
How to protect your Google and Facebook accounts with a security key
Threat detection automation won’t solve all your problems
What it takes to be a security architect
Microsoft finally bans SHA-1 certificates in Internet Explorer and Edge
Bot-generated comments swamp FCC, urging overturn of net neutrality
FBI/IC3: Vile $5B business e-mail scam continues to breed
New IoT malware targets 100,000 IP cameras via known flaw

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Check Point boosts cloud-security education to help IT security pros stay relevant

Check Point is investing heavily in educating IT pros about the cloud, not only to promote their own cloud security products but to give potential customers the skills they’ll need to keep their jobs as their employers move more and more resources to public cloud providers. Read More

Thumbnail Image

How to protect your Google and Facebook accounts with a security key

Security keys offer a more secure alternative to code-based two-factor authentication. Read More

Thumbnail Image

Threat detection automation won’t solve all your problems

To close the cybersecurity gap, look to incident response automation Read More

Thumbnail Image
INSIDER

What it takes to be a security architect

While the path to security architect varies, anyone considering the role should have a passion for IT infrastructure and protecting data. Read More

Thumbnail Image

Microsoft finally bans SHA-1 certificates in Internet Explorer and Edge

The Tuesday updates for Internet Explorer and Microsoft Edge forces those browsers to flag SSL/TLS certificates signed with the ageing SHA-1 hashing function as insecure. Read More

Thumbnail Image

Bot-generated comments swamp FCC, urging overturn of net neutrality

An apparent bot-generated campaign has posted more than 83,400 comments on the U.S. Federal Communications Commission's website supporting the agency chairman's plan to gut net neutrality rules. Read More

Thumbnail Image

FBI/IC3: Vile $5B business e-mail scam continues to breed

The FBI’s Internet Crime Complaint Center (IC3) this week said the plague it calls the Business Email Compromise continues to rack-up victims and money – over 40,000 worldwide victims and $5 billion in the latest count. Read More

Thumbnail Image

New IoT malware targets 100,000 IP cameras via known flaw

Over 100,000 internet-connected cameras may be falling prey to a new IoT malware that’s spreading through recently disclosed vulnerabilities in the products. Read More

eBook: Silver Peak Systems Inc

6 Ways to Improve Your Network Security with SD-WAN

With the right SD-WAN solution, broadband internet service are secure enough for the enterprise. Read this eBook to learn six ways to use a secure SD-WAN solution to improve network security and compliance. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

25 geek-inspired gifts for Mother's Day

Cool ways to celebrate Star Wars Day Read More

Most-Read Stories

1. FCC should produce logs to prove ‘multiple DDoS attacks stopped net neutrality comments
2. 7 things Microsoft left out of Windows 10
3. 18 free cloud storage options
4. Hot jobs of the future
5. Why Edward Snowden loves open source
6. Intel sold you out
7. Google Project Zero researchers find ‘crazy bad’ Windows RCE that is wormable
8. 7 free tools every network needs
9. Verizon taps into open source, white box fervor with new CPE offering
10. What it takes to be a security architect
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.