How to approach keeping your IoT devices safe

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Oct 26, 2016
Featured Image

Dyn attack: US Senator wants to know why IoT security is so anemic

Sen. Mark Warner sent letters to FCC, FTC and DHS to find out what can be done to prevent attacks like the one that hit Dyn; how defend against botnet attacks like Mirai’s. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to approach keeping your IoT devices safe
OwnBackup: Don't rely on SaaS vendors to do their own backup and recovery
Residential routers easy to hack
Rise of the IoT machines
US intelligence targets advanced security management of virtual systems
DoJ: What does it take to prosecute federal computer crimes?

White Paper: Recorded Future

50 Shades of Dark: How to Use the Dark Web for Threat Intelligence

There's a lot of talk about the dark web these days, including how cyber criminals use it to spread malware, leak intellectual property, and publish user account credentials. Using open source intelligence (OSINT), our team explored the surface, deep, and dark parts of the web and investigated the links between them. Read More

Thumbnail Image

How to approach keeping your IoT devices safe

With the recent take down of DYN and Brian Krebs’ web site, cybercriminals have found a way to use your own devices to bring the internet to its knees. Portnox’s CEO Ofer Amitai provides some ways to keep those devices safe from these attacks. Read More

Thumbnail Image

OwnBackup: Don't rely on SaaS vendors to do their own backup and recovery

OwnBackup is making a business out of what vendors should (arguably) do: secure and automated daily backups of SaaS and PaaS data. Read More

Thumbnail Image

Residential routers easy to hack

Home routers are flawed and vulnerable to being hacked, claims security firm ESET. Read More

Thumbnail Image

Rise of the IoT machines

Who is responsible for preventing DDoS attacks involving IoT devices? Read More

Thumbnail Image

US intelligence targets advanced security management of virtual systems

The advanced research arm of the Office of the Director of National Intelligence rolled out the Virtuous User Environment (VirtUE) program which the agency says “is looking to use the federal government’s impending migration to commercial cloud-based IT infrastructures and the current explosion of new virtualization and operating system concepts to create and demonstrate a more secure interactive user computing environment than the government has had in the past or likely to have in the near future.” Read More

Thumbnail Image

DoJ: What does it take to prosecute federal computer crimes?

The need for vigorous criminal enforcement of cybercrime laws will only become more important as networked computers and the criminals who target them grow. That was how the Department of Justice started a blog post this week that defined how it decides whether or not to prosecute a federal computer-related crime. Read More

White Paper: Recorded Future

How to Produce a World-Class Threat Intelligence Capability

Learn how to overcome the political inertia that often accompanies building a threat intelligence team from the ground up. This white paper details how to merge operational and strategic capabilities to automate and analyze external attack data to identify current and future security threats. Discover the six core competencies that comprise a successful program. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

iOS 10 tips and tricks you need to know

Celebrating 12 years of Ubuntu Read More

Most-Read Stories

1. Media fails to tell consumers about device flaws in Friday’s internet outage
2. Does Southwest’s new ‘password’ commercial need to get away?
3. Who is most likely to buy Avaya?
4. How the Dyn DDoS attack unfolded
5. iOS 10 tips and tricks you need to know
6. White House: Small satellites bring “Moore’s Law” into space
7. Microsoft Graveyard: What Microsoft has killed in 2016
8. 19 free cloud storage options
9. 7 free tools every network needs
10. Chinese firm admits its hacked products were behind Friday's massive DDOS attack
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.