|
White Paper: Recorded Future There's a lot of talk about the dark web these days, including how cyber criminals use it to spread malware, leak intellectual property, and publish user account credentials. Using open source intelligence (OSINT), our team explored the surface, deep, and dark parts of the web and investigated the links between them. Read More ▶ |
In a dramatic change in strategy, Google Fiber has paused plans to roll out fiber optic cables across a number of U.S. cities, as the company reevaluates its strategy to presumably use mainly wireless to provide high-speed Internet service. Read More ▶ |
|
Google has acquired a 3-year-old eye-tracking company focused on virtual and augmented reality, signaling the tech giant's interest in the immersive technologies. Read More ▶ |
|
|
What's big, red, and supposed to be the next big thing in workplace collaboration? Google's new Jamboard, a massive touch display and accompanying cloud service that's supposed to help business users brainstorm together. Read More ▶ |
|
The first true Google phone has a lot of powerful features, but for some of them you'll need to know where to look. Read More ▶ |
|
There are big changes afoot for Google Cloud Platform's storage offerings. On Thursday, the company announced a complete overhaul of the storage options available to customers, complete with new storage tiers and reduced pricing. Read More ▶ |
|
A Russian hacking group used spearphishing to steal the Gmail login credentials of Hillary Clinton campaign staff, and that may be how campaign emails now being released were stolen, according to Secure Works. Read More ▶ |
|
Google is trying to do away with the tiring process of figuring out who's supposed to do what after a meeting wraps up with a new Action Items feature. Read More ▶ |
|
White Paper: Recorded Future Learn how to overcome the political inertia that often accompanies building a threat intelligence team from the ground up. This white paper details how to merge operational and strategic capabilities to automate and analyze external attack data to identify current and future security threats. Discover the six core competencies that comprise a successful program. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS Celebrating 12 years of Ubuntu Read More ▶ |
Most-Read Stories |