Do you have an incident response plan in place?

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 20, 2017

A cybersecurity risk assessment is a critical part of M&A due diligence  

As corporate boards get more deeply involved in understanding their own company’s cybersecurity posture, it stands to reason they would want to know similar information about an acquisition target. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Do you have an incident response plan in place?
DARPA wants to cultivate the ultimate transistor of the future
Cobol plays major role in U.S. government breaches
Unpatched vulnerability puts Ubiquiti networking products at risk
Ask.com serves as a conduit for malware - again
String of fileless malware attacks possibly tied to single hacker group
(2013) Ethernet filters out porn, plus  9 other facts (?) we learned from Bob Metcalfe’s Reddit Q&A
(2007) TI calculator turns 40 … and I'm getting old

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image
INSIDER

Do you have an incident response plan in place?

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored. Read More

Thumbnail Image

DARPA wants to cultivate the ultimate transistor of the future

Researchers with the Defense Advanced Research Projects Agency will this month present a program that looks to develop a new generation of radiofrequency (RF) and millimeter-wave transistors to address the power and range requirements for billions of wirelessly communicating devices in everything from unmanned aircraft and home appliances to sensors and smartphones. Read More

Thumbnail Image

Cobol plays major role in U.S. government breaches

New research is turning on its head the idea that legacy systems -- such as Cobol and Fortran -- are more secure because hackers are unfamiliar with the technology. Read More

Thumbnail Image

Unpatched vulnerability puts Ubiquiti networking products at risk

An unpatched command injection vulnerability could allow hackers to take over enterprise networking products from Ubiquiti Networks. Read More

Thumbnail Image

Ask.com serves as a conduit for malware - again

Businesses that allow the Ask.com toolbar in their environments might want to rethink that after endpoints equipped with the browser add-on were compromised last November and then again the very next month using pretty much the same attack methods. Read More

Thumbnail Image

String of fileless malware attacks possibly tied to single hacker group

Several attacks observed over the past few months that rely heavily on PowerShell, open-source tools and fileless malware techniques, might be the work of a single group of hackers. Read More

(2013) Ethernet filters out porn, plus  9 other facts (?) we learned from Bob Metcalfe’s Reddit Q&A

Bob Metcalfe, who 40 years ago invented Ethernet along with David Boggs, spent two hours this week regaling Reddit users with his thoughts on everything from  software-defined networking to Internet porn. Read More

(2007) TI calculator turns 40 … and I'm getting old

Read More

White Paper: Microsoft Corporation

Simplify Your Government Records Management System

Written specifically for government records officers and their IT departments, this compelling e-guide looks at the growing challenge of managing an ever-increasing amount of electronic records and provides recommendations for a time-saving regulation- and mandate-compliant solution. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Which Linux distros should newbies use?

6 cloud computing savings you may be missing out on Read More

Most-Read Stories

1. New iPhone 8 concept photos are jaw-dropping
2. Cisco security advisory dump finds 20 warnings, 2 critical
3. Desktop Linux the best it’s ever been—and keeps getting better
4. Microsoft’s Azure cloud storage had a rough night
5. PII of 33,698,126 Americans leaked online
6. DARPA plan would reinvent not-so-clever machine learning systems
7. Head-scratching ways companies screw up Wi-Fi
8. 19 free cloud storage options
9. 7 free tools every network needs
10. Microsoft ends updates for Windows 7/8.1 on new processors
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.