5 security bad habits (and easy ways to break them)

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Apr 05, 2016
Featured Image

HTTP compression continues to put encrypted communications at risk

Security researchers have expanded and improved the three-year-old BREACH attack that exploits the HTTP compression mechanism in order to recover sensitive information such as authentication cookies from encrypted Web traffic. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

5 security bad habits (and easy ways to break them)
So, you want to be a security pro? Read this first
See how these companies were social engineered
Security vs. IT: Your 2016 career outlook compared
Top 25 free apps for Windows 10
Light will ultimately secure the Internet, scientists say
Data and Identity: Two New Security Perimeters
Researchers reveal 'Surreptitious Sharing on Android' vulnerabilities

White Paper: CrowdStrike

5 Reasons Endpoint Security Must Move to the Cloud

Learn how the Cloud makes it possible to regain unprecedented control over endpoints while detecting, preventing, and responding to attacks in a way that far surpasses on-premise architectures. Read More

Thumbnail Image

5 security bad habits (and easy ways to break them)

Your end-users are often the weakest link in your organization's security strategy. Here are five solutions to help users strengthen their security posture. Read More

Thumbnail Image
INSIDER

So, you want to be a security pro? Read this first

Here are some insights to help IT professionals take advantage of the talent shortage – as well as some reasons it might not be the right move for you. Read More

Thumbnail Image

See how these companies were social engineered

A security consultant lays out various scenarios in hopes you are not the next victim. Read More

Thumbnail Image
INSIDER

Security vs. IT: Your 2016 career outlook compared

Annual IT Salary Survey shines a light on hiring and compensation trends. Read More

Thumbnail Image

Top 25 free apps for Windows 10

Here’s the best of the best for Windows 10. Sometimes good things come in free packages Read More

Thumbnail Image

Light will ultimately secure the Internet, scientists say

Absolute secure information will eventually be made available through a revolutionary light-based password exchange now that a technical limitation has been removed, say researchers. Read More

Data and Identity: Two New Security Perimeters

Leading organizations are investing in new controls for sensitive data protection Read More

Thumbnail Image

Researchers reveal 'Surreptitious Sharing on Android' vulnerabilities

8 of 12 evaluated apps were vulnerable, including privacy-focused messaging apps, but researchers said the security flaws are 'definitely present in many more apps' besides the ones tested for the research paper. All of the tested apps with the flaws were fixed except for Skype; Microsoft reportedly opted not to respond to the responsible disclosure. Read More

White Paper: F5 Networks

An App-Centric Approach to Digital Transformation

Traditional datacenter perimeters are dissolving as users access applications from a multitude of environments on a variety of devices. Read the whitepaper to learn how. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

9 new features in Windows 10

Terrible computer pranks that could get you fired Read More

Most-Read Stories

1. Techie April Fools’ Day – in pictures
2. MIT Media Lab defaults to free & open source software
3. Raspberry Pi + Google Coder = HTML + CSS + JS + node.js = way cool
4. 19 free cloud storage options
5. Ubuntu on Windows - The good, the bad and the just plain weird
6. Microsoft: Universal Windows apps will keep 'bit rot' from slowing your PC over time
7. 10 no-cost home security mobile apps worth a download
8. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
9. 5 things you should know about two-factor authentication
10. Salary Survey 2016: How does your compensation stack up?
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.