Enterprise encryption adoption up, but the devil's in the details

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jul 22, 2016
Featured Image

FBI needs to beef-up high-tech cyber threat evaluations says DoJ Inspector General

a report out this week from the Department of Justice’s Office of the Inspector General which found that while the FBI has an annual process, known as Threat Review and Prioritization (TRP), to identify the most severe and substantial threats and direct resources to them, the process employs subjective terminology that is open to interpretation, and as such does not prioritize cyber threats in an objective, data-driven, reproducible, and auditable manner. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Enterprise encryption adoption up, but the devil's in the details
Dell patches critical flaws in SonicWALL Global Management System
Petition urges Apple not to release technology for jamming phone cameras
Flaws in Oracle file processing SDKs affect major third-party products
How bandwidth thieves will be nabbed in the future

White Paper: JAMF Software

Employee Choice Programs

Technology is integral to everything we do, especially at work. Consequently, employees have preferences for certain device brands and expect to be able to choose those devices at work. Read More

Thumbnail Image

Enterprise encryption adoption up, but the devil's in the details

A new survey by the Ponemon Institute finds that enterprise-wide encryption strategies are accelerating but there are risks to consider Read More

Thumbnail Image

Dell patches critical flaws in SonicWALL Global Management System

Dell has patched several critical flaws in its central management system for SonicWALL enterprise security appliances, such as firewalls and VPN gateways. Read More

Thumbnail Image

Petition urges Apple not to release technology for jamming phone cameras

Over 11,000 people have signed a petition asking Apple not to deploy technology that would allow third parties like the police to use it to disable cameras on user phones under certain circumstances. Read More

Thumbnail Image

Flaws in Oracle file processing SDKs affect major third-party products

Seventeen high-risk vulnerabilities out of the 276 flaws fixed by Oracle Tuesday also affect products from third-party software vendors, including Microsoft. Read More

Thumbnail Image

How bandwidth thieves will be nabbed in the future

A bandwidth-theft solution that utilizes crowdsourcing has obtained funding. It promises to change how pirates stealing bandwidth on radio spectrum are caught. Read More

White Paper: JAMF Software

Mac OS X Security Checklist

The Center for Internet Security (CIS) benchmark for OS X is widely regarded as a comprehensive checklist for organizations to follow to secure their Macs. This white paper from JAMF Software-the Apple Management Experts-will show you how to best implement the independent organizations' recommendations. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Integration projects that went terribly wrong

10 advanced endpoint protection tools Read More

Most-Read Stories

1. 19 free cloud storage options
2. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
3. Credibility and trust: Microsoft blows it
4. Peeping into 73,000 unsecured security cameras thanks to default passwords
5. 7 free tools every network needs
6. How Forbes inadvertently proved the anti-malware value of ad blockers
7. 9 Common Spanning Tree Mistakes
8. 6 free network vulnerability scanners
9. Ten operating systems for the Raspberry Pi
10. 10 biggest home networking mistakes (and how to fix them)
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.