Looking to 2017: It’s not just enterprise security

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Dec 12, 2016
Featured Image
INSIDER

10 essential PowerShell security scripts for Windows administrators

PowerShell is a valuable tool for automating Windows administration tasks, including laborious security chores Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Looking to 2017: It’s not just enterprise security
The IoT: Gateway for enterprise hackers
Ransomware attacks against businesses increased threefold in 2016
Obama orders review of election hacks as Trump doubts Russia's role
Why CISO Succeed and Why They Leave
Cisco Talos: Zeus spawn “Floki bot” malware gaining use, cyber-underworld notoriety
(From our archives) They said the iPhone would be a flop
DARPA gamification plan to get deep-thinkers, game-changers to collaborate
Cisco whacks its Secure Access Control System

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Looking to 2017: It’s not just enterprise security

Things are bad for the security of everything and data privacy, and 2017 will be equally bad if not worse. Read More

Thumbnail Image

The IoT: Gateway for enterprise hackers

The Internet of Things keeps growing – and so do the threats. At a webinar this week, a panel warned enterprises that it is crucial to be able to see radio-enabled devices on the network, or they could be blind to the risks they pose. Read More

Thumbnail Image

Ransomware attacks against businesses increased threefold in 2016

The number of ransomware attacks targeting companies increased threefold from January to September, affecting one in every five businesses worldwide. Read More

Thumbnail Image

Obama orders review of election hacks as Trump doubts Russia's role

President Barack Obama has ordered U.S. intelligence agencies to conduct a full review of the cyberattacks that allegedly tried to disrupt this year's election, as his successor Donald Trump casts doubt over Russia's possible involvement. Read More

Why CISO Succeed and Why They Leave

Data from ESG/ISSA report reveals the most important attributes for CISOs and why CISOs leave their jobs so often Read More

Thumbnail Image

Cisco Talos: Zeus spawn “Floki bot” malware gaining use, cyber-underworld notoriety

“[Floki bot] is based on the same codebase that was used by the infamous Zeus trojan, the source code of which was leaked in 2011. Rather than simply copying the features that were present within the Zeus trojan ‘as-is’, Floki Bot claims to feature several new capabilities making it an attractive tool for criminals,” Talos wrote. Read More

Thumbnail Image

(From our archives) They said the iPhone would be a flop

Pundits who got it wrong explain why ... or deny that they did Read More

Thumbnail Image

DARPA gamification plan to get deep-thinkers, game-changers to collaborate

The agency is proposing an online community known as Gamifying the Search for Strategic Surprise (GS3) that would “apply a unique combination of online game and social media technologies and techniques to engage a large number of experts and deep thinkers in a shared analytic process to rapidly identify, understand, and expand upon the potential implications and applications of emerging science and technology. The program will also develop a mechanism to identify and quickly fund research opportunities that emerge from this collaborative process,” DARPA stated. Read More

Thumbnail Image

Cisco whacks its Secure Access Control System

Cisco this week this week announced the death of its Secure Access Control System – a package customers use to manage access to network resources. Read More

White Paper: Palo Alto Networks

Exploit Kits: Getting in By Any Means Necessary

Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims' machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

What’s in store for tech in 2017

20 years ago: Hot sci/tech images from 1996 Read More

Most-Read Stories

1. AT&T to cough up $88M for ‘cramming’ mobile customer bills
2. Say goodbye to MS-DOS command prompt
3. Cisco whacks its Secure Access Control System
4. Apache Zeppelin open-source analytics startup reveals new name, fresh funding
5. Cisco Talos: Zeus spawn “Floki bot” malware gaining use cyber underworld notoriety
6. 19 free cloud storage options
7. Just one autonomous car will use 4,000 GB of data/day
8. 10 reasons to divorce the cloud
9. 10 most useful Slack bots
10. 7 free tools every network needs
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.