Microsoft releases 18 security bulletins, 9 rated critical, many bugs disclosed/exploited

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 15, 2017
Featured Image

DARPA fortifies early warning system for power-grid cyber assault

The Defense Advanced Research Projects Agency (DARPA) continues to hone the system it hopes would quickly restore power to the U.S. electric grid in the event of a massive cyberattack. The research agency this week said it awarded defense system stalwart BAE Systems an $8.6 million contract to develop a system under its Rapid Attack Detection, Isolation and Characterization (RADICS) program that has as its central goal to develop technology that will detect and automatically respond to cyber-attacks on US critical infrastructure. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Microsoft releases 18 security bulletins, 9 rated critical, many bugs disclosed/exploited
IBM's position on Security Analytics and Operations (SOAPA), part 2
Microsoft stays security bulletins' termination
Old nemesis spam becoming significant way for attackers to subvert data
Thieves steal Petya ransomware then use it for free
DOJ: No, we won't say how much the FBI paid to hack terrorist's iPhone

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Microsoft releases 18 security bulletins, 9 rated critical, many bugs disclosed/exploited

For March's Patch Tuesday, Microsoft released 18 security bulletins, 9 of which are rated critical. Read More

IBM's position on Security Analytics and Operations (SOAPA), part 2

Marc van Zadelhoff, general manager of IBM’s security division, discusses SOAPA requirements, intelligence and scale. Read More

Thumbnail Image

Microsoft stays security bulletins' termination

Microsoft today postponed the retirement of the security bulletins it uses to describe in detail each month's slate of vulnerabilities and patches. Read More

Thumbnail Image

Old nemesis spam becoming significant way for attackers to subvert data

Spam is once again raising its ugly head as a chief way for attackers to grab protected data. IBM’s X-Force Threat Intelligence group said today that one of the key findings from its forthcoming Threat Intelligence Index for 2017 is that spam volume grew dramatically throughout 2016, bringing with its host of new malicious attachments harboring banking Trojans and ransomware. Read More

Thumbnail Image

Thieves steal Petya ransomware then use it for free

Crooks are stealing code from the purveyors of Petya ransomware and using it to extort money from innocent victims, stiffing the creators of the malware out of the cut they are supposed to get. Read More

Thumbnail Image

DOJ: No, we won't say how much the FBI paid to hack terrorist's iPhone

The Justice Department says it should not have to reveal the maker of a tool used last year to crack an alleged terrorist's iPhone or disclose how much it paid. Read More

Research/Infographic: ITS Partners

10 Examples of Employee Behaviors in the Cloud That Can Increase Risk

Every CISO knows that cloud apps are being used by employees. Some are approved apps but most are not. What every CISO doesn't know is the full extent of the actions employees are taking in those cloud apps and how those actions introduce risk. We've summarized the top risky actions employees are taking in an infographic you should print and post on your door. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Which Linux distros should newbies use?

6 cloud computing savings you may be missing out on Read More

Most-Read Stories

1. 28 facts about pi that you probably didn't know
2. Old nemesis spam becoming significant way for attackers to subvert data
3. Anonymous hacker causes dark web to shrink by as much as 85%
4. Cisco jumps on ex-Juniper exec Davidson for service provider biz
5. New iPads and iPhone SE may hit stores next week
6. Fears arise that Trump has dropped ball on H-1B reform
7. Why GE is winning the war for tech talent
8. IBM pledge: Not only does Notes/Domino live, there's no end in sight
9. 7 free tools every network needs
10. Cisco issues critical warning around Apache Struts2 vulnerability
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.