|
Solution Center: Rapid7 When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More ▶ |
Cisco this week issued a notice that faulty clock timing chips in some of its switches, routers and security appliances could fail after about 18 month of service – causing those devices to crash and not recover. Read More ▶ |
|
If anyone can make sense of the over 74,000 pages of the US tax code, IBM’s Watson can. Or at least that’s the plan as Big Blue has teamed up its Watson cognitive supercomputer with the tax return specialists at H&R Block to help customers with tax filing options. Read More ▶ |
|
|
High-profile breaches are just the tip of the iceberg. Many have never been detected or disclosed--and without a major infrastructure changes it's only going to get worse Read More ▶ |
|
Diligent recently surveyed 2,000 people to see who got caught hook, line and sinker for the phishing scam. Read More ▶ |
|
Cisco has rolled out a second release of its Tetration Analytics package with features such as a smaller footprint and a cloud service that will go a long way toward making the system alluring to more data center customers. Read More ▶ |
|
78% of security pros say threat intelligence is essential to their organization’s security, but just 27% say their organizations effectively use threat data. Why the disconnect? Read More ▶ |
|
William (Bill) Yeager, 66, creator of the multiprotocol router, reflects on the development of the device that fueled the growth of networking. Read More ▶ |
|
Stronger Internet of Things (IoT) security will come through small pieces that align costs and benefits. Read More ▶ |
|
Cisco Systems has fixed a critical vulnerability that could allow hackers to take over servers used by telecommunications providers to remotely manage customer equipment such as routers. Read More ▶ |
|
White Paper: Leidos A comprehensive look at the top four challenges facing your security operations is the first step to mitigating them. Why not approach them as opportunities to strengthen your cybersecurity posture and better protect your assets! This white paper discusses the universal challenges facing every SOC: Resource allocation, Threat alert management, Vendor dependencies, Intelligence standardization Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS 7 (more) security TED Talks you can’t miss Read More ▶ |
Most-Read Stories |