Microsoft unveils a bonanza of security capabilities

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Feb 13, 2017
Featured Image
INSIDER

How San Diego fights off 500,000 cyberattacks a day

San Diego has a huge range of technologies to support and secure, from legacy apps to smart city devices. Learn how the city’s security team is eliminating blind spots, prioritizing threats, and reducing exposure and loss. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Microsoft unveils a bonanza of security capabilities
Cisco Umbrella cloud service shapes security for cloud, mobile resources
Expert: Line between cyber crooks and cyber spies getting more blurry
(2012) Video about ESD both shocking and funny
'Fileless malware' attacks, used on banks, have been around for years
Gartner: Algorithm-based technology patents are raging
IRS warns on ever-changing “dangerous W-2 phishing scam”
NASA has a shadow IT problem

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Microsoft unveils a bonanza of security capabilities

Companies concerned about cybersecurity have a fleet of new Microsoft tools coming their way. The company announced a host of new security capabilities Friday morning as part of the run-up to the massive RSA security conference next week in San Francisco. Read More

Thumbnail Image

Cisco Umbrella cloud service shapes security for cloud, mobile resources

In an attempt to address such anxieties Cisco today announced Umbrella, a secure, cloud-based gateway, based on technology from OpenDNS and other technologies it acquired such as CloudLock as well as existing Cisco security services that together ultimately promises to offer secure business access to resources even when users are not using the safety of a VPN. Read More

Thumbnail Image

Expert: Line between cyber crooks and cyber spies getting more blurry

Cybercriminals acting on behalf of national governments and nation-backed espionage agents carrying out cybercrimes for cash on the side is the future of security threats facing corporations and governments, says the former top U.S. attorney in charge of the Department of Justice’s national security division. Read More

(2012) Video about ESD both shocking and funny

Read More

Thumbnail Image

'Fileless malware' attacks, used on banks, have been around for years

Fileless malware attacks, which were recently discovered in the networks of at least 140 banks, telecoms and governments, account for about 15% of known attacks today and have been around for years. Read More

Thumbnail Image

Gartner: Algorithm-based technology patents are raging

Gartner wrote that according to a worldwide search on analytics vendor Aulive, nearly 17,000 patents applied for in 2015 mentioned "algorithm" in the title or description, versus 570 in 2000. Including those mentioning "algorithm" anywhere in the document, there were more than 100,000 applications last year versus 28,000 five years ago. At this pace, and considering the rising interest in protecting algorithmic intellectual property, by 2020 there could be nearly half a million patent applications mentioning "algorithm," and more than 25,000 patent applications for algorithms themselves, Read More

Thumbnail Image

IRS warns on ever-changing “dangerous W-2 phishing scam”

Just as tax season gets underway in earnest, the Internal Revenue Service put out a warning about what it called dangerous, evolving W-2 scams that are targeting corporations, school districts and other public and private concerns. Read More

Thumbnail Image

NASA has a shadow IT problem

It not often enterprises get direct evidence of a shadow IT operation but a recent audit of NASA’s IT realm came up with 28 unsanctioned cloud services operating in its environment. NASA’s own CIO office found eight such services while the NASA Office of Inspector General discovered another 20, as part of an overall cloud security audit done by the NASA OIG. Read More

Video/Webcast: OpenText

How to Improve Your Business for Safe, Secure, Compliant Information Flows

Hear how simplifying and running digital with the right solutions can help you outperform competitors and boost your bottom line in this new audiobook from SAP and OpenText. Find out how digital transformation helped one company reduce subscriber cancellations to record lows, and saved another company $1 million annually. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Google's crazy cool offices

25 Valentine's Day gifts inspired by tech, science and math Read More

Most-Read Stories

1. 13 tech jobs that pay $200k salaries
2. As third RSA Conference without ‘booth babes’
3. Windows Trojan hacks into embedded devices to install Mirai
4. NASA has a shadow IT problem
5. 19 free cloud storage options
6. 7 free tools every network needs
7. Trump eyes end to an H-1B system that favors largest outsourcers
8. Cisco grows cloud menu, brings Microsoft Azure stack into UCS
9. Cisco Umbrella cloud service shapes security for cloud mobile resources
10. PHP vs. Node.js: An epic battle for developer mindshare
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.