The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Dec 26, 2016
Featured Image
INSIDER

Free security tools to support cyber security efforts

There are enough quality gratis cyber security tools among the differing security product categories to make this free tool treasure hunt worth your while. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence
Cisco whacks its Secure Access Control System
What fake news means for IT—and how IT security can help fight it
What the infosec jobs sector will look like in 2017
Black market medical record prices drop to under $10, criminals switch to ransomware
Cisco Talos: Zeus spawn “Floki bot” malware gaining use, cyber-underworld notoriety
US collects social media handles from select visitors
Looking back to look forward on cybersecurity
Apple gives iOS app developers more time to encrypt communications

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence

So what technologies are going to change this scenario back in favor of IT? The new security AAA: Automation, analytics and artificial intelligence say proponents. When it comes to automation, security platforms will devise and execute controls based on newly detected threats and do it without human intervention. That reduces the time between a compromise and the time the threat is neutralized – reducing the time window when attackers can do damage. Read More

Thumbnail Image

Cisco whacks its Secure Access Control System

Cisco this week this week announced the death of its Secure Access Control System – a package customers use to manage access to network resources. Read More

Thumbnail Image

What fake news means for IT—and how IT security can help fight it

The debate over fake news is roiling the political world, but elements of it look very familiar to tech veterans—and represent a potentially new attack vector that IT needs to worry about. Read More

Thumbnail Image
INSIDER

What the infosec jobs sector will look like in 2017

Security experts believe smaller IT companies will outsource parts of their security. Read More

Thumbnail Image

Black market medical record prices drop to under $10, criminals switch to ransomware

The black market value of stolen medical records dropped dramatically this year, and criminals shifted their efforts from stealing data to spreading ransom ware, according to a report released this morning Read More

Thumbnail Image

Cisco Talos: Zeus spawn “Floki bot” malware gaining use, cyber-underworld notoriety

“[Floki bot] is based on the same codebase that was used by the infamous Zeus trojan, the source code of which was leaked in 2011. Rather than simply copying the features that were present within the Zeus trojan ‘as-is’, Floki Bot claims to feature several new capabilities making it an attractive tool for criminals,” Talos wrote. Read More

Thumbnail Image

US collects social media handles from select visitors

Visitors to the U.S. under a visa waiver program are being asked by the Department of Homeland Security for information on their social media accounts, a plan that had drawn criticism from civil rights groups for its potential encroachment on privacy. Read More

Looking back to look forward on cybersecurity

There have been lots of activities over the past two years that will only gain more traction in 2017. Read More

Thumbnail Image

Apple gives iOS app developers more time to encrypt communications

Apple has backtracked on a plan to force iOS developers to encrypt their app communications by the end of the year. Read More

White Paper: Fortinet, Inc.

Advanced Threats, Advanced Solutions: Integrating a Sandbox Into Your Infrastructure

The volume of threats is increasing, and cybercriminals are enhancing their techniques every day. Companies struggle to proactively see the threats that are coming, knowing when they have been breached and reacting quickly to minimize the threat. Download this whitepaper to learn about 12 different advanced malware techniques being used today and how sandboxing is an incredible tool that can help. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Up close with Google Wifi's setup process

2016: The year of tech products nobody wanted Read More

Most-Read Stories

1. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
2. Most powerful Internet of Things companies
3. 20 cool things you can do with a Raspberry Pi
4. Ultimate guide to Raspberry Pi operating systems, part 1
5. Ten operating systems for the Raspberry Pi
6. 19 free cloud storage options
7. The 25 most powerful enterprise networking companies
8. 8 reasons the Apple Watch is more trouble than it's worth
9. 12 lesser-known Apple Watch tips and tricks you should know
10. 15 big data and analytics companies to watch
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.