Network World Security Alert |
| |
|
The Defense Advanced Research Projects Agency (DARPA) continues to hone the system it hopes would quickly restore power to the U.S. electric grid in the event of a massive cyberattack. The research agency this week said it awarded defense system stalwart BAE Systems an $8.6 million contract to develop a system under its Rapid Attack Detection, Isolation and Characterization (RADICS) program that has as its central goal to develop technology that will detect and automatically respond to cyber-attacks on US critical infrastructure. Read More ▶ |
|
| Solution Center: Rapid7 When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More ▶ | For March's Patch Tuesday, Microsoft released 18 security bulletins, 9 of which are rated critical. Read More ▶ |
| Marc van Zadelhoff, general manager of IBM’s security division, discusses SOAPA requirements, intelligence and scale. Read More ▶ |
| | Microsoft today postponed the retirement of the security bulletins it uses to describe in detail each month's slate of vulnerabilities and patches. Read More ▶ |
| Spam is once again raising its ugly head as a chief way for attackers to grab protected data. IBM’s X-Force Threat Intelligence group said today that one of the key findings from its forthcoming Threat Intelligence Index for 2017 is that spam volume grew dramatically throughout 2016, bringing with its host of new malicious attachments harboring banking Trojans and ransomware. Read More ▶ |
| Crooks are stealing code from the purveyors of Petya ransomware and using it to extort money from innocent victims, stiffing the creators of the malware out of the cut they are supposed to get. Read More ▶ |
| The Justice Department says it should not have to reveal the maker of a tool used last year to crack an alleged terrorist's iPhone or disclose how much it paid. Read More ▶ |
| Research/Infographic: ITS Partners Every CISO knows that cloud apps are being used by employees. Some are approved apps but most are not. What every CISO doesn't know is the full extent of the actions employees are taking in those cloud apps and how those actions introduce risk. We've summarized the top risky actions employees are taking in an infographic you should print and post on your door. Read More ▶ | Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ | SLIDESHOWS 6 cloud computing savings you may be missing out on Read More ▶ | Most-Read Stories |
|
|
|