Open source users: It’s time for extreme vetting

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Feb 09, 2017
Featured Image

NASA has a shadow IT problem

It not often enterprises get direct evidence of a shadow IT operation but a recent audit of NASA’s IT realm came up with 28 unsanctioned cloud services operating in its environment. NASA’s own CIO office found eight such services while the NASA Office of Inspector General discovered another 20, as part of an overall cloud security audit done by the NASA OIG. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Open source users: It’s time for extreme vetting
Gartner: Algorithm-based technology patents are raging
Study: 1 in 3 website visitors is an attack bot
Mac malware, possibly made in Iran, targets US defense industry
Hard-to-detect fileless attacks target banks, other organizations
Accenture wants to help businesses secure their blockchains
AT&T, IBM, Nokia join to make IoT systems safer
(From our archives) Remember when Cisco sued Apple over the iPhone name?
(2012) Why did BlackBerry blacklist the 'Pooh' gang?

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image
INSIDER

Open source users: It’s time for extreme vetting

Cybersecurity strategist at Red Hat focuses on vetting and open source as part of the supply chain Read More

Thumbnail Image

Gartner: Algorithm-based technology patents are raging

Gartner wrote that according to a worldwide search on analytics vendor Aulive, nearly 17,000 patents applied for in 2015 mentioned "algorithm" in the title or description, versus 570 in 2000. Including those mentioning "algorithm" anywhere in the document, there were more than 100,000 applications last year versus 28,000 five years ago. At this pace, and considering the rising interest in protecting algorithmic intellectual property, by 2020 there could be nearly half a million patent applications mentioning "algorithm," and more than 25,000 patent applications for algorithms themselves, Read More

Thumbnail Image
INSIDER

Study: 1 in 3 website visitors is an attack bot

And 94.2 percent of 100,000 inspected websites experienced at least one bot attack during a 90-day survey period. Read More

Thumbnail Image

Mac malware, possibly made in Iran, targets US defense industry

Just because you’re using a Mac doesn’t mean you’re safe from hackers. That’s what two security researchers are warning, after finding a Mac-based malware that may be an attempt by Iranian actors to target the U.S. defense industry. Read More

Thumbnail Image

Hard-to-detect fileless attacks target banks, other organizations

A wave of attacks that have recently affected banks and other enterprises used open-source penetration testing tools loaded directly into memory instead of traditional malware, making their detection much harder. Read More

Thumbnail Image

Accenture wants to help businesses secure their blockchains

Accenture wants to help businesses use blockchain technologies more securely by locking away the encryption keys they use to sign transactions. Read More

Thumbnail Image

AT&T, IBM, Nokia join to make IoT systems safer

Some big players in security and the internet of things, including AT&T and Nokia, are joining forces to solve problems that they say make IoT vulnerable in many areas. Read More

Thumbnail Image

(From our archives) Remember when Cisco sued Apple over the iPhone name?

Cisco Systems' General Counsel, explaining Friday's blockbuster patent and copyright infringement lawsuits against switching rival Arista Networks, emphasized that "I can count on one hand the number of times we’ve initiated suit against a competitor, supplier or customer." Mark Chandler might be right, but he's probably pretty close to having to resort to his second hand. And when Cisco does sue, it makes a splash. Remember when the company sued Apple seven years ago over the name of a forgettable little device dubbed iPhone? Read More

(2012) Why did BlackBerry blacklist the 'Pooh' gang?

Read More

eBook: Fujitsu America

7 Success Stories in Data Center Consolidation and Virtualization

Data center infrastructure complexity must be tamed, as mobility, cloud networking and social media demand fast and agile approaches to data delivery. You can overcome these obstacles and improve your data center operations by consolidating your systems and deploying virtualization, using the Fujitsu PRIMEFLEX vShape reference architecture. Get the e-Book. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Google's crazy cool offices

25 Valentine's Day gifts inspired by tech, science and math Read More

Most-Read Stories

1. 14 Python libraries too good to overlook
2. Juniper founder, CTO Sindhu cuts role to focus on startup
3. Cisco: Faulty clock part could cause failure in some Nexus switches, ISR routers, ASA security appliances
4. Mac malware, possibly made in Iran, targets US defense industry
5. 5 things to know about Cisco and AppDynamics
6. 7 free tools every network needs
7. 19 free cloud storage options
8. 19 free cloud storage options
9. Early version of Windows 10 Cloud leaked
10. The end of net neutrality is nigh—here’s what’s likely to happen
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.