|
Solution Center: Rapid7 When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More ▶ |
Things are bad for the security of everything and data privacy, and 2017 will be equally bad if not worse. Read More ▶ |
|
The Internet of Things keeps growing – and so do the threats. At a webinar this week, a panel warned enterprises that it is crucial to be able to see radio-enabled devices on the network, or they could be blind to the risks they pose. Read More ▶ |
|
|
The number of ransomware attacks targeting companies increased threefold from January to September, affecting one in every five businesses worldwide. Read More ▶ |
|
President Barack Obama has ordered U.S. intelligence agencies to conduct a full review of the cyberattacks that allegedly tried to disrupt this year's election, as his successor Donald Trump casts doubt over Russia's possible involvement. Read More ▶ |
|
Data from ESG/ISSA report reveals the most important attributes for CISOs and why CISOs leave their jobs so often Read More ▶ |
|
“[Floki bot] is based on the same codebase that was used by the infamous Zeus trojan, the source code of which was leaked in 2011. Rather than simply copying the features that were present within the Zeus trojan ‘as-is’, Floki Bot claims to feature several new capabilities making it an attractive tool for criminals,” Talos wrote. Read More ▶ |
|
Pundits who got it wrong explain why ... or deny that they did Read More ▶ |
|
The agency is proposing an online community known as Gamifying the Search for Strategic Surprise (GS3) that would “apply a unique combination of online game and social media technologies and techniques to engage a large number of experts and deep thinkers in a shared analytic process to rapidly identify, understand, and expand upon the potential implications and applications of emerging science and technology. The program will also develop a mechanism to identify and quickly fund research opportunities that emerge from this collaborative process,” DARPA stated. Read More ▶ |
|
Cisco this week this week announced the death of its Secure Access Control System – a package customers use to manage access to network resources. Read More ▶ |
|
White Paper: Palo Alto Networks Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims' machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS 20 years ago: Hot sci/tech images from 1996 Read More ▶ |
Most-Read Stories |