How to keep IT security together in a company that's gone bankrupt

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Oct 11, 2016
Featured Image

IoT security guidance emerges

A new report from the Cloud Security Alliance offers advice on how to secure IoT devices from inception. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to keep IT security together in a company that's gone bankrupt
A breach alone means liability
DDoS attacks using IoT devices follow The Manchurian Candidate model
What IT admins love/hate about 8 top network monitoring tools
Cisco Talos: Spam at levels not seen since 2010
White House asks: Do you need more data portability?

White Paper: Rsam

Vendor Risk Management: How To Get Better Visibility

How well do you know your vendors and the risk they pose? The scope of vendors you need to assess is rising constantly. At the same time, there is more scrutiny than ever on data security and privacy. These factors create greater shared risk where organizations can be held liable for their vendors' actions. To get a complete view of risk, you need a way to automatically combine subjective and objective data. Read More

Thumbnail Image

How to keep IT security together in a company that's gone bankrupt

If you're working for a company that's filed for bankruptcy, you're definitely going to encounter choppy waters when it comes to maintaining tech security. We talked to IT pros who have been through it to find out the best ways to cope. Read More

Thumbnail Image

A breach alone means liability

Usually someone must suffer injury for a company to be held liable in a security breach. Now, a breach alone is enough. Read More

Thumbnail Image

DDoS attacks using IoT devices follow The Manchurian Candidate model

Follow these steps to prevent hackers from exploiting vulnerable IoT devices to launch DDoS attacks. Read More

Thumbnail Image
INSIDER

What IT admins love/hate about 8 top network monitoring tools

IT administrators discuss the most valuable features of eight network monitoring products – from vendors such as CA, Microsoft, NetScout, Opsview and Nagios -- and the features that need improvement. Read More

Thumbnail Image

Cisco Talos: Spam at levels not seen since 2010

“Many of the host IPs sending Necurs' spam have been infected for more than two years. To help keep the full scope of the botnet hidden, Necurs will only send spam from a subset of its minions. An infected host might be used for two to three days, and then sometimes not again for two to three weeks. This greatly complicates the job of security personnel who respond to spam attacks, because while they may believe the offending host was subsequently found and cleaned up, the reality is that the miscreants behind Necurs are just biding their time, and suddenly the spam starts all over again. Read More

Thumbnail Image

White House asks: Do you need more data portability?

The White House Office of Science and Technology Policy (OSTP) has issued a request for information about how much is too much or too little data portability and what are the implications? Read More

eBook: Amazon Web Services

Building a Data Lake on AWS

Data Lake is a new and increasingly popular way to store and analyze data that addresses many of these challenges. Data Lake allows an organization to store all of their data, structured and unstructured, in one, centralized repository. Since data can be stored as-is, there is no need to convert it to a predefined schema and you no longer need to know what questions you want to ask of your data beforehand. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Sneak peek: 15 gadgets to put on your holiday wish list

Most dangerous cyber celebrities of 2016 Read More

Most-Read Stories

1. Level 3 blames huge network outage on unspecified configuration error
2. AT&T jumps into SD-WAN market; partners with IBM
3. Level 3 acknowledges network outage
4. 19 free cloud storage options
5. 7 free tools every network needs
6. Top U.S. colleges for computer science
7. 3 nightmare election hack scenarios
8. New Dynamic for CPE
9. High Security for Workers and Guests
10. 6 free network vulnerability scanners
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.