|
Solution Center: Rapid7 When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More ▶ |
The smartphone risk is higher this year than in 2015. There are more active cyber criminals and many more shoppers using smartphones to find products and make purchases, either via Wi-Fi in stores or online in other locations. Read More ▶ |
|
>From the Googleplex to the spaceship, high-tech headquarters shot from above. Read More ▶ |
|
|
A study out this week conducted by the Ponemon Institute and sponsored by Resilient an IBM company said that 66% of the 2,400 security and IT professionals they interviewed said their organization is not prepared to recover from cyberattacks. Read More ▶ |
|
If you ever wonder why phishing scammers continue to try myriad ways of ripping people off you need look no further than this. The El Paso Times this week reported that the city had been scammed out of $3.2 million through a phishing scheme that targeted municipality’s street car development program. Read More ▶ |
|
After months of wrangling, Arista today said US Customs has given it permission to begin reselling its networking gear in the United States. Read More ▶ |
|
These are the best small to medium-sized cities for landing a job in the security sector, according to CyberSeek, a new data-driven heat map from CompTIA that provides real-time insight on the cybersecurity job market. Read More ▶ |
|
FireEye’s iSIGHT combines machine learning with human analytics to uncover security blind spots and better understand attackers’ tools and tactics. Read More ▶ |
|
The Association for Computing Machinery has changed the name of its annual award recognizing computing professionals for early-to-mid-career innovations from the ACM-Infosys Foundation Award to the ACM Prize in Computing, and boosted the value of the prize by $75K. Read More ▶ |
|
What we mean when we talk about method, opportunity and motive. Read More ▶ |
|
White Paper: Absolute Software Corporation Be it malicious or well-intentioned, the most hazardous use of 'Shadow IT' is probably the simplest. Storing files in the cloud using cloud-sync applications is common practice for backing up or sharing files with co-workers. While these tools are believed to be secure, the true point of failure is the 'Insider Threat,' and only true visibility and a preventive approach can unmask the threat and mitigate the risk. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS Meet Cisco’s Founders Forum members Read More ▶ |
Most-Read Stories |