Cisco issues 7 “high priority” security advisories; Firepower, IOS and ASA issues among them

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Apr 21, 2017
Featured Image
INSIDER

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity.  Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Cisco issues 7 “high priority” security advisories; Firepower, IOS and ASA issues among them
Are we ready to bid the SIEM farewell?
DHS warns on immigration spoofing scam
Don't get bit by zombie cloud data
Flaws let attackers hijack multiple Linksys router models
5 ways to keep virtual assistants from sharing your company's secrets
Bose accused of spying on users, illegal wiretapping via Bose Connect app

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Cisco issues 7 “high priority” security advisories; Firepower, IOS and ASA issues among them

Cisco had a pretty large dump of security advisories today – seven “high priority” and one “critical” – impacting a variety of products many with the threat allowing a remote attacker to cause a denial of service. Read More

Thumbnail Image

Are we ready to bid the SIEM farewell?

SIEM technology is old, and possibly not properly configured making it vulnerable to attacks. Read More

Thumbnail Image

DHS warns on immigration spoofing scam

You could probably see this one and others like it coming, given the current immigration quagmire that is the United States immigration environment. Read More

Thumbnail Image

Don't get bit by zombie cloud data

Data you thought you had deleted from the cloud can come back to haunt you. Get to know your provider’s data deletion policy Read More

Thumbnail Image

Flaws let attackers hijack multiple Linksys router models

Two dozen Linksys router models are exposed to attacks that could extract sensitive information from their configurations, cause them to become unresponsive and even completely take them over. Read More

Thumbnail Image

5 ways to keep virtual assistants from sharing your company's secrets

Consumers love talking to Alexa, Siri, Cortana and Google Now. But what should CIOs be doing to prepare for the growing use of virtual assistants among their employees? Read More

Thumbnail Image

Bose accused of spying on users, illegal wiretapping via Bose Connect app

A lawsuit alleges the Bose Connect app secretly intercepts and shares what you listen to. Read More

Research/Infographic: Citrix Systems

Manage Risk by Protecting the Apps and Data that Drive Business Productivity

View this infographic to discover the security strategies needed to overcome the challenges of securing a business environment transformed by technologies such as cloud and new workforce requirements such as mobility, BYO and third-party talent. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

10 more killer Raspberry Pi projects (Collection 2)

New products of the week 4.17.17 Read More

Most-Read Stories

1. Virtual assistants hear everything, so watch what you say, I'm not kidding
2. iPhone 8 release date may be delayed until November
3. 31 tech pros share favorite IT products
4. 18 free cloud storage options
5. 5 must-have security tools
6. 5 Open Source companies to watch in 2017
7. IT execs tout benefits of SD-WAN
8. 7 free tools every network needs
9. Just one autonomous car will use 4,000 GB of data/day
10. Cybersecurity remains an elusive business priority
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.