7.4% of software on PCs are past end of life

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Feb 23, 2017
Featured Image

Cisco touts next-gen firewall gear for midsize installations

Cisco is coming out with four next generation firewall boxes aimed at giving smaller organizations protection that is better sized to their needs and engineered to minimize performance hits as additional security services are turned on. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

7.4% of software on PCs are past end of life
What is OWASP, and why it matters for AppSec
Reaching the cybersecurity tipping point
What to expect from the Trump administration on cybersecurity
New macOS ransomware spotted in the wild
(From our archives) History's first prank phone call was way back in ... 1884?
(2011)Whirlwind tour of computing and telecom's top honors, awards and prizes
(2013) When did you learn how to code?

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

7.4% of software on PCs are past end of life

Research shows 7.4 percent of software on PCs are past end of life, meaning it's no longer patched and is vulnerable to exploitation. Read More

Thumbnail Image

What is OWASP, and why it matters for AppSec

Boost your application security (AppSec) with the Open Web Application Security Project (OWASP) guidelines. Read More

Thumbnail Image

Reaching the cybersecurity tipping point

Are you creating conditions that lead employees toward their cybersecurity tipping point—to committing to solid security and privacy practices? Read More

Thumbnail Image

What to expect from the Trump administration on cybersecurity

Look for U.S. President Donald Trump's administration to push for increased cybersecurity spending in government, but also for increased digital surveillance and encryption workarounds. Read More

Thumbnail Image

New macOS ransomware spotted in the wild

A new file-encrypting ransomware program for macOS is being distributed through bittorrent websites and users who fall victim to it won't be able to recover their files, even if they pay. Read More

(From our archives) History's first prank phone call was way back in ... 1884?

Read More

Thumbnail Image

(2011)Whirlwind tour of computing and telecom's top honors, awards and prizes

From the Nobel to the Marconi: Internet, Ethernet, security and other IT/telecom pioneers get their recognition Read More

(2013) When did you learn how to code?

Read More

KnowledgeVault: Veracode

Application Security KnowledgeVault

Protecting data from outside hackers is a tough enough problem. But did you know you may be be building vulnerabilities into your applications? Watch this Knowledge Vault from Veracode to learn the scope of the problem, and what you can do to assure your apps - and organization - are secure. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

7 features Linux could borrow from other systems

12 steps to small business security Read More

Most-Read Stories

1. Apple to unveil new iPads, a red iPhone 7, and a revamped iPhone SE in March
2. iPhone 8 Rumor Rollup: thrown for a curve, glass crack clues 3D sensing
3. The cloud is growing 7 times faster than the rest of IT
4. How Google reinvented security and eliminated the need for firewalls
5. Cisco deepens enterprise network virtualization, security detection of DNA suite
6. Microsoft Azure now runs Kubernetes, for managing lots of containers
7. 7 free tools every network needs
8. 19 free cloud storage options
9. SAP license fees are due even for indirect users, court says
10. Breaking through the cybersecurity bubble
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.