The most momentous tech events of the past 30 years

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 25, 2016
Featured Image

Justice Department indicts Iran hackers in massive financial cyberattack

The U.S. Department of Justice has indicted seven Iranians in connection with cyber attacks on U.S. banks, the New York Stock Exchange, AT&T and a water facility in New York, according to published reports. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The most momentous tech events of the past 30 years
The networked world
Stealthy USB Trojan hides in portable applications, targets air-gapped systems
9 ways technology will change within the next 10 years
Why you need a CSO/CISO
How to make Android a real part of your business
HexaTier secures all those databases in the cloud
User-controlled, private clouds could help with security, think scientists
Cybersecurity as a Business Issue

Video/Webcast: Centrify Corporation

They Have All Our Passwords. It's Time for MFA Everywhere.

Learn about how to stop attackers in their tracks with MFA and the steps to take to further mitigate risk from compromised credentials. Read More

Thumbnail Image

The most momentous tech events of the past 30 years

History-making events from Cisco, IBM and Nortel to Facebook, Google and Apple. Read More

Thumbnail Image

The networked world

Network World 30th Anniversary: The digital nervous system of the modern enterprise is driving today’s digital transformations. Read More

Thumbnail Image

Stealthy USB Trojan hides in portable applications, targets air-gapped systems

A Trojan program is being distributed through USB drives and seems to be designed for stealing information from so-called air-gapped computers that are not connected to the Internet. Read More

Thumbnail Image

9 ways technology will change within the next 10 years

Ten years ago, there were no smartphones. It was the coffeeshop era of Wi-Fi, which meant that the Internet was just beginning to follow us out the door and into the world. Amazon first released EC2, to some confusion. Here’s a look ahead to 10 years in the future, and how the tech world may change. Read More

Thumbnail Image

Why you need a CSO/CISO

When it comes to security, you're better off employing a specialist. However, according to recent research, less than half of companies employ a CSO/CISO. Read More

Thumbnail Image
INSIDER

How to make Android a real part of your business

Android smartphone and tablets can now safely join iPhones and iPads in your mobile portfolio Read More

Thumbnail Image

HexaTier secures all those databases in the cloud

Another day, another Israeli security firm. It must be something in the water. Read More

Thumbnail Image

User-controlled, private clouds could help with security, think scientists

A total reversal of how permissions and PII is stored is proposed by computer scientists. Read More

Cybersecurity as a Business Issue

ESG research data demonstrates that improving cybersecurity is a business – not just an IT – priority. What does this mean for enterprise organizations? Read More

White Paper: 8x8 Inc

The Elephant Herd in the Room: Why Other Enterprise VoIP Providers Don't Like to Talk About Compliance, Security and Reliability

There's an elephant in the room. A whole herd of elephants, in fact. When it comes to compliance, security and reliability, the silence among VoIP providers is deafening. But there's one VoIP provider that has plenty to say on these topics. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Comedians find Apple-FBI standoff a laughing matter (watch videos)

How to respond to ransomware threats Read More

Most-Read Stories

1. Windows 10 'Redstone' update to bring UI changes
2. 9 ways technology will change within the next 10 years
3. 25 real-life ways people have been hurt using their phones
4. 19 free cloud storage options
5. Male computer programmers shown to be right up there with chefs, dentists on gender pay gap scale
6. The most momentous tech events of the past 30 years
7. Google explains its cloud computing vision for enterprises and startups
8. Is Google pushing the cloud envelope too far?
9. Three more hospitals hit with ransomware attacks
10. Chuck Robbins rewires Cisco
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.