|
eGuide: Citrix Systems The mobile workforce is here to stay, but many IT organizations still lack a mobile security strategy that comprises both PCs and mobile devices-and the applications and data on those devices. As one of our writer's asks, what are these enterprises waiting for? Read More ▶ |
Yahoo said investigators were looking into the possibility that some people within the company knew at the time about the late 2014 theft of information of at least 500 million user accounts. Read More ▶ |
|
When it was announced a year ago, the Cisco/Ericsson partnership was hailed as “the right move for us right now,” according to Cisco CEO Chuck Robbins to create the networks of the future. While the partnership has done well – the companies say they have closed 60 deals together -- Ericsson is being battered financially this year and the impact that will have on the partnership could change it in the future. Read More ▶ |
|
|
Researchers say 10% of repositories hosted by cloud providers, including some on Amazon and Google, are compromised, and ‘lurking malice’ is hidden in them. Read More ▶ |
|
In Bryan Lunduke’s ongoing quest to make his digital life as secure and private as possible, he’s found three instant messaging networks worth talking about. Read More ▶ |
|
As security leaders, we want to allow your teams to move as fast as possible and not deploy a policy or technology because someone touts it as the best way to do something. Security vendor Conga provides these tips for that healthy balance. Read More ▶ |
|
An Israeli hacker found a vulnerability in routers that could have allowed him to take over the public Wi-Fi network of an entire city. Read More ▶ |
|
Google said it will deal with website recidivists that have dodged the company's punishments for spreading malware and spawning email scams. Read More ▶ |
|
Hours after Donald Trump won the presidential election, a suspected Russian cyberespionage team was blamed for targeting several U.S. think tanks with phishing emails designed to fool victims into installing malware. Read More ▶ |
|
IBM says the platform, called Project Intu lets Project Intu offers developers easily build cognitive or basically machine learning skills into a wide variety of operating systems – from Raspberry PI to MacOS, Windows to Linux devices. Devices using Intu can “interact more naturally with users, triggering different emotions and behaviors and creating more meaningful and immersive experience for users. Developers can simplify and integrate Watson services, such as Conversation, speech-to-text, Language and Visual Recognition, with the capabilities of the “device” to, in essence, act out the interaction with the user,” IBM stated Read More ▶ |
|
White Paper: Bay Dynamics Protecting IT assets is a complicated business. With so many moving parts and concerns, security teams can be overwhelmed by the threats and vulnerabilities barraging their enterprises every day. How can security teams ensure they are addressing the right threats and vulnerabilities that could lead to a compromise of their crown jewels? Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS Brace yourselves, commercial drones are coming Read More ▶ |
Most-Read Stories |