Security analysis of popular IoT devices

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Nov 16, 2016

Goodbye, NAC. Hello, software-defined perimeter

Like NAC, software-defined perimeter (SDP) is a bit of a niche today. But cloud, IoT and mobility will likely drive massive SDP proliferation over the next few years. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Security analysis of popular IoT devices
2017 breach predictions: The big one is inevitable
Half of banking customers now using fintech
How automated investigation can accelerate threat detection
Planetary scientists push for unique asteroid deflection mission
IBM package brings Watson smarts to everything IoT
Netgear's Arlo Go camera makes security more mobile
Super Mari-owned: Startling Nintendo-based vulnerability discovered in Ubuntu

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Security analysis of popular IoT devices

Zscaler analyzed the security of popular IoT devices, such as security cameras, smart TV devices, printers, DVRs and IP phones. The results were mixed. Read More

Thumbnail Image

2017 breach predictions: The big one is inevitable

In 2017, we’ll see more intricate, complex and undetected data integrity attacks and for two main reasons: financial gain and/or political manipulation. Read More

Thumbnail Image

Half of banking customers now using fintech

A new report finds half of banking customers around the globe are now using financial technology products or services from at least one fintech firm, but customers also put much more trust in traditional financial institutions. Read More

Thumbnail Image

How automated investigation can accelerate threat detection

Cyber security analysts are overwhelmed with the pressure of keeping their companies safe. Here’s what you need to consider when adopting an automated investigation environment. Read More

Thumbnail Image

Planetary scientists push for unique asteroid deflection mission

Proponents are trying to garner worldwide support for the mission pointing to the European Space Administration ministerial conference in Luzern next month where the decision will be made whether or not to fund the ESA’s Asteroid Impact Mission (AIM). AIM is part of an over-arching collaborative effort with NASA known as the Asteroid Impact and Deflection Assessment (AIDA) mission. Read More

Thumbnail Image

IBM package brings Watson smarts to everything IoT

IBM says the platform, called Project Intu lets Project Intu offers developers easily build cognitive or basically machine learning skills into a wide variety of operating systems – from Raspberry PI to MacOS, Windows to Linux devices. Devices using Intu can “interact more naturally with users, triggering different emotions and behaviors and creating more meaningful and immersive experience for users. Developers can simplify and integrate Watson services, such as Conversation, speech-to-text, Language and Visual Recognition, with the capabilities of the “device” to, in essence, act out the interaction with the user,” IBM stated Read More

Thumbnail Image

Netgear's Arlo Go camera makes security more mobile

New networked security camera operates on batteries and LTE access. Read More

Thumbnail Image

Super Mari-owned: Startling Nintendo-based vulnerability discovered in Ubuntu

A vulnerability in a multimedia framework present on some versions of Ubuntu can be exploited by sound files meant to be played on the venerable Nintendo Entertainment System, according to security researcher Chris Evans. Read More

eGuide: Citrix Systems

eGuide: A Mobile Security Strategy for Your Workforce

The mobile workforce is here to stay, but many IT organizations still lack a mobile security strategy that comprises both PCs and mobile devices-and the applications and data on those devices. As one of our writer's asks, what are these enterprises waiting for? Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Six big projects that went open-source

6 machine learning misunderstandings Read More

Most-Read Stories

1. Best Black Friday 2016 deals on Apple iPhones, iPads, watches and more
2. 37% of IT pros to look for new jobs in 2017
3. Amazon, Newegg go all out on Black Friday 2016 tech deals
4. 50-plus eye-popping Black Friday 2016 tech deals
5. BlackNurse attack: 1 laptop can DoS some firewalls, bring down big servers
6. 7 free tools every network needs
7. 19 free cloud storage options
8. Black Friday deals on the iPhone 7 offer up incredible savings
9. Target, Kmart & Sears Black Friday 2016 tech deals revealed
10. Cool Yule Tools 2016: Our Top Picks
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.