The 10 Windows group policy settings you need to get right

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 21, 2016
Featured Image

FBI warning puts car hacking on bigger radar screen

The FBI this week warned carmakers and owners that they need to pay much closer attention to automotive cybersecurity. The National Highway Transportation Safety joined with the FBI in warning consumer that the increasing number of computers in the form of electronic control units (ECUs) that control numerous vehicle functions from steering, braking, and acceleration, to the lights and windshield wipers make them vulnerable to potential cybersecurity problems. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The 10 Windows group policy settings you need to get right
5 things you need to know about SSL
Safari, Chrome and Flash Player hacked during first day at Pwn2Own, some of them twice
Cisco’s acquisition of Synata brings search to Spark
FTC warns app developers against using audio monitoring software
Cybersecurity Skills Shortage Impact on Cloud Computing
Security Sessions: Tips for building a security team

Video/Webcast: Check Point Software Technologies Ltd.

A New Model for Security Management

Join us live April 5th @11:00 AM EDT for this webcast to understand the trends that are disrupting the way security is managed today. Read More

Thumbnail Image
INSIDER

The 10 Windows group policy settings you need to get right

Configure these 10 group policy settings carefully, and enjoy better Windows security across the office Read More

Thumbnail Image

5 things you need to know about SSL

Here's a quick and dirty guide to SSL/TLS, one of the most important technologies for securing data on the Internet. Read More

Thumbnail Image

Safari, Chrome and Flash Player hacked during first day at Pwn2Own, some of them twice

Security researchers exploited previously unknown vulnerabilities in Apple Safari, Google Chrome and Flash Player to compromise the latest versions of OS X and Windows during the first day of the annual Pwn2Own hacking contest. Read More

Thumbnail Image

Cisco’s acquisition of Synata brings search to Spark

With respect to Spark specifically, one of its competitive differentiators is the integrated security. Cisco is the market leader in IT security and applied its expertise to Spark. All messages and documents stored in Spark are encrypted. This is a mandatory feature for heavily regulated verticals such as healthcare and financial services. Read More

Thumbnail Image

FTC warns app developers against using audio monitoring software

The U.S. Federal Trade Commission has sent warning letters to 12 smartphone app developers for allegedly compromising users' privacy by packaging audio monitoring software into their products. Read More

Cybersecurity Skills Shortage Impact on Cloud Computing

CISOs must plan for expansive cloud growth AND a lack of cybersecurity professionals with cloud computing skills Read More

Thumbnail Image
Video

Security Sessions: Tips for building a security team

You're asked to build (or rebuild) a security team at your organization. What are some first steps and tips to keep in mind to maximize talent and efficiency in your new department? Josh Feinblum, VP of Information Security at Rapid7 has some advice. Watch Now

Video/Webcast: Armor

Armor & Slide Network Inc. Video Case Study | The Gift of Trust

How did this gift card app startup leverage an active cyber defense solution and PCI-compliant platform to win the trust of retailers, customers and investors? In this video, we hear why their relationship with Armor is so critical to their success. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

11 highest paying tech jobs in America

7 VPN services for hotspot protection Read More

Most-Read Stories

1. Why Dropbox dropped Amazon's cloud
2. 10 hard-core coding tips for faster Python
3. ISPs aren't telling customers their router is a public hotspots
4. DreamHost replaces VMware SDN with open source for big savings
5. 19 free cloud storage options
6. IT is getting cloud storage security all wrong
7. Steam Stealer malware provides a thriving business for cyber thugs
8. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
9. Can't have SDDC without SD-WAN: Nuage
10. The top 14 new open source projects
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.