Why (or where) many security programs fail

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Feb 21, 2017
Featured Image

RSA: Eric Schmidt shares deep learning on AI

In a wide-ranging conversation focused on artificial intelligence, the Google executive also touched on security concerns and the need to keep the internet open. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Why (or where) many security programs fail
Here’s how the US government can bolster cybersecurity
IRS Dirty Dozen: Phishing, phone cons and identity theft lead scam list for 2017
Ride along to solve these data breaches
RSA demo: TruStar anonymizes incident data to improve information exchange
Why cyber-robotics is key to cybersecurity's future
Iraqi hacker took credit for hijacking subdomain and defacing Trump site
SD-WANs get IPv6 support from Versa
Users take the cheese to solve data breaches

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image
Video

Why (or where) many security programs fail

At RSA 2017, CSO’s Steve Ragan chats with security expert Ira Winkler about where many security programs are failing within companies, as well as his concept of “advanced persistent security.” Watch Now

Thumbnail Image

Here’s how the US government can bolster cybersecurity

Almost 20 years ago, Chris Wysopal was among a group of hackers who testified before U.S. Congress, warning it about the dangers of the internet. Read More

Thumbnail Image

IRS Dirty Dozen: Phishing, phone cons and identity theft lead scam list for 2017

The Internal Revenue Service rounded up some of the usual suspects in its annual look at the Dirty Dozen scams you need to watch out for this year. It should come as no surprise that the IRS saw a big spike in phishing and malware incidents during the 2016 tax season because the agency has been very public about its battle with this scourge. Read More

Thumbnail Image
INSIDER

Ride along to solve these data breaches

Verizon’s recently released annual breach report that examines some of its cases where the RISK Team was called in to hunt down culprits. The “ride –along edition” of Verizon’s report gets a first-person perspective of the company that calls in the heavy hitters to find out why the network has slowed or where a leak is. Read More

Thumbnail Image
Video

RSA demo: TruStar anonymizes incident data to improve information exchange

TruStar's head of product, Shimon Modi, shows CSO Online's Steve Ragan how his company is changing the game when it comes to incident reporting for companies. Watch Now

Thumbnail Image
Video

Why cyber-robotics is key to cybersecurity's future

Chad Holmes, Principal of Ernst & Young LLP sits down with Network World's Neal Weinberg to talk about how cyber-robotics will help shape the future of cybersecurity. Watch Now

Thumbnail Image

Iraqi hacker took credit for hijacking subdomain and defacing Trump site

When was the last time you checked DNS configurations for subdomains pointing at services not in use? Read More

Thumbnail Image

SD-WANs get IPv6 support from Versa

Software Defined Networking vendor Versa this week added support for IPv6 to its SD-WAN and security packages. According to Kumar Mehta, founder and CDO of Versa Networks by supporting IPv4 and IPv6 for SD-WAN and SD-Security, customers will have the flexibility to design their WAN under IPv4 today and protect it from obsolescence as they switch over to IPv6 in the future. Read More

Thumbnail Image

Users take the cheese to solve data breaches

Verizon releases its annual breach report that puts the reader in the driver's seat. Read More

Case Study: NetApp

Calculate How Flash Makes Operational Sense

How can hybrid-flash array users benefit from a move to all-flash? This case study profiles a large European organization that moved their VMware server and desktop environments from hybrid-flash to NetApp AFF all-flash systems. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

10 ways tech pros can take charge of their professional development

What cyberinsurance gotchas companies must be ready for Read More

Most-Read Stories

1. How Google reinvented security and eliminated the need for firewalls
2. Cisco reserves $125 million to pay for faulty clock component in switches, routers
3. Juniper facing fatal clock flaw that impacts Cisco routers, switches
4. University attacked by its own vending machines, smart light bulbs and 5,000 IoT devices
5. Apple to unveil iOS 11 at WWDC on June 5
6. 7 free tools every network needs
7. Why big data projects fail and how to make 2017
8. Hot products at RSA 2017
9. NSS Labs rated 13 advanced endpoint security products, flagged 2 with caution rating
10. RSA: Elite cryptographers scoff at idea that law enforcement can overcome encryption
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.