Experts at RSA give their best cybersecurity advice

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Feb 20, 2017
Featured Image

IRS Dirty Dozen: Phishing, phone cons and identity theft lead scam list for 2017

The Internal Revenue Service rounded up some of the usual suspects in its annual look at the Dirty Dozen scams you need to watch out for this year. It should come as no surprise that the IRS saw a big spike in phishing and malware incidents during the 2016 tax season because the agency has been very public about its battle with this scourge. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Experts at RSA give their best cybersecurity advice
Why (or where) many security programs fail
Insecure Android apps put connected cars at risk
CyberTech conference showcases cybersecurity solutions originating in Israel  
The high price of security shaming [Infographic]
RSA: Eric Schmidt shares deep learning on AI
HPE joins Cisco, Juniper with faulty clock technology problem
Cisco reserves $125 million to pay for faulty clock component in switches, routers
SD-WANs get IPv6 support from Versa

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Experts at RSA give their best cybersecurity advice

Come to the RSA show, and you’ll find plenty of cybersecurity technology. The top vendors from across the industry are here, showing products for fighting ransomware, preventing data breaches and more. Read More

Thumbnail Image
Video

Why (or where) many security programs fail

At RSA 2017, CSO’s Steve Ragan chats with security expert Ira Winkler about where many security programs are failing within companies, as well as his concept of “advanced persistent security.” Watch Now

Thumbnail Image

Insecure Android apps put connected cars at risk

Android applications that allow millions of car owners to remotely locate and unlock their vehicles are missing security features that could allow hackers to easily hijack their functionality. Read More

CyberTech conference showcases cybersecurity solutions originating in Israel  

Israel is developing cybersecurity expertise and solutions as a leading export. The recent CyberTech conference in Tel Aviv showcased both products and talent that are making an impact Read More

Thumbnail Image
INSIDER

The high price of security shaming [Infographic]

Two-thirds of IT security professionals said they would pay an average of $124,000 to avoid public scandals associated with security breaches. Read More

Thumbnail Image

RSA: Eric Schmidt shares deep learning on AI

In a wide-ranging conversation focused on artificial intelligence, the Google executive also touched on security concerns and the need to keep the internet open. Read More

Thumbnail Image

HPE joins Cisco, Juniper with faulty clock technology problem

Hewlett Packard Enterprise is the latest vendor to identify a faulty clocking component of its products that can cause them to crash and not recover. Read More

Thumbnail Image

Cisco reserves $125 million to pay for faulty clock component in switches, routers

In its quarterly financial results announcement, this week, Cisco said it had set aside $125 million to help cover the cost of replacing networking gear impacted by a fatal clock component. Read More

Thumbnail Image

SD-WANs get IPv6 support from Versa

Software Defined Networking vendor Versa this week added support for IPv6 to its SD-WAN and security packages. According to Kumar Mehta, founder and CDO of Versa Networks by supporting IPv4 and IPv6 for SD-WAN and SD-Security, customers will have the flexibility to design their WAN under IPv4 today and protect it from obsolescence as they switch over to IPv6 in the future. Read More

White Paper: Intel Security

Bust the myth of the malware "silver bullet."

"Silver bullet" solutions might provide initial malware relief. But they'll never protect endpoints from emboldened cybercriminals like a coordinated security platform will. Only our endpoint defense combats emerging threats while simplifying your security operations. All, with traditional protection, advanced analytics, and containment throughout the threat lifecycle. Read the white paper. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

10 ways tech pros can take charge of their professional development

What cyberinsurance gotchas companies must be ready for Read More

Most-Read Stories

1. How Google reinvented security and eliminated the need for firewalls
2. Cisco reserves $125 million to pay for faulty clock component in switches, routers
3. Juniper facing fatal clock flaw that impacts Cisco routers, switches
4. University attacked by its own vending machines, smart light bulbs and 5,000 IoT devices
5. Apple to unveil iOS 11 at WWDC on June 5
6. 7 free tools every network needs
7. Why big data projects fail and how to make 2017
8. Hot products at RSA 2017
9. NSS Labs rated 13 advanced endpoint security products, flagged 2 with caution rating
10. RSA: Elite cryptographers scoff at idea that law enforcement can overcome encryption
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.