How to maintain security while employees are out of the office for the holidays

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Dec 16, 2016
Featured Image

14 eyebrow-raising things Google knows about you

Some are fascinating, others are frightening, but here's how to find out what Google has on you. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to maintain security while employees are out of the office for the holidays
Yahoo breach means hackers had three years to abuse user accounts
NASA embraces IBM’s Watson for future space, aerospace technology development
U.S. DOT advances mandate for vehicle-to-vehicle communications technology
Arista wins big in latest court patent case go-around over Cisco
(From our archives) IETF attendees re-engineer their hotel's Wi-Fi network
Privacy protections for wearable devices are weak, study says
Protecting more than privacy in schools
(From our archives) How IT pros cheat on certification exams

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

How to maintain security while employees are out of the office for the holidays

As workers are enjoying time away from the office for the holidays, hackers are viewing this slow down as an optimal time to attack corporate systems. To avoid having your organization turn into this holiday’s victim, security professionals provide tips for IT managers to protect corporate data.  Read More

Thumbnail Image

Yahoo breach means hackers had three years to abuse user accounts

Security researchers are disturbed it took Yahoo three years to discover that details of over 1 billion user accounts had been stolen back in 2013. Read More

Thumbnail Image

NASA embraces IBM’s Watson for future space, aerospace technology development

IBM and NASA have had one of the longest, most successful relationships in the high-tech world and it looks like the future holds much the same. Read More

Thumbnail Image

U.S. DOT advances mandate for vehicle-to-vehicle communications technology

Looking to put a high-tech solution to a deadly problem the U.S. Department of Transportation has issued a proposed rule to standardize the development and implementation of vehicle communications technologies in cars and trucks. The idea is to enable a multitude of new crash-avoidance applications that could save lives by preventing “hundreds of thousands of crashes every year by helping vehicles “talk” to each other,” the DOT stated. Read More

Thumbnail Image

Arista wins big in latest court patent case go-around over Cisco

In rejecting a $335 million damage award to Cisco, a California jury gave Arista Networks a key verdict in part of the expansive patent infringement lawsuit the two networking companies are fighting over. While the jury found Arista had copied some of Cisco Command Line Interface it declined it declined to award in damages. The jury also found that Arista did not infringe the single patent remaining in the case as well as Cisco’s asserted copyrights in its user manuals. Read More

(From our archives) IETF attendees re-engineer their hotel's Wi-Fi network

What happens when a bunch of IETF super nerds show up in Paris for a major conference and discover their hotel's Wi-Fi network has imploded? Read More

Thumbnail Image

Privacy protections for wearable devices are weak, study says

The rapidly expanding wearable device market raises serious privacy concerns, with some device makers collecting massive amounts of personal data and sharing it with other companies, according to a new study. Read More

Thumbnail Image

Protecting more than privacy in schools

Vendors and researchers want more student data to improve curriculum, but who is thinking about governance and risk management in education? Read More

(From our archives) How IT pros cheat on certification exams

Incidents of cheating on IT certifications are on the rise, a trend that experts say is an outward sign of the desperation felt by out-of-work and under-employed IT professionals. Read More

Video/Webcast: Rogue Wave Software

Building the perfect PHP app for the enterprise: Keeping up with PHP

This introductory session lays the foundation for your PHP app and this series. If you have at least one year of PHP experience, this webinar explains these key building blocks for creating and maintaining enterprise-class applications, mobile services, and third-party libraries. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

2016’s notable deaths in technology, science & inventions

7 ways new sys admins can boost career trajectories Read More

Most-Read Stories

1. Arista wins big in latest court patent case go around over Cisco
2. Riverbed stabs at Cisco’s heart with next-gen routing
3. Mom discovered twin daughters’ bedroom being streamed via live camera viewer app
4. The latest ransomware is pure evil genius
5. 10 game changing networking acquisitions of 2016
6. 19 free cloud storage options
7. 7 free tools every network needs
8. Dec. 2016 Patch Tuesday: Microsoft releases 12 security bulletins, 6 rated critical
9. 8 big data predictions for 2017
10. Lessons learned from the 7 major cyber security incidents of 2016
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.