IBM, Vermont Electric spawn intelligent energy software company

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Feb 27, 2017
Featured Image

Replace SHA-1. It’s not that hard.

Now that SHA-1 has been broken it’s time for enterprises that have ignored its potential weakness for years to finally act, and it’s not that hard. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

IBM, Vermont Electric spawn intelligent energy software company
Google discloses unpatched IE vulnerability after Patch Tuesday delay
3 security analytics approaches that don’t work (but could) — Part 2
Cloudflare bug exposed passwords, other sensitive data from websites
I come to bury SHA1, not to praise it
Fraud rises as cybercriminals flock to online lenders
Cisco unveils Hierarchy of Needs for the digital enterprise

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

IBM, Vermont Electric spawn intelligent energy software company

IBM today said it would partner with Vermont Electric Power to create Utopus Insights to research develop and product intelligent analytic software for the energy industry. IBM said Utopus will bring to market a full-featured energy analytics platform, architected for cloud (SaaS), on-premises and distributed Internet of Things (IoT) operation. Read More

Thumbnail Image

Google discloses unpatched IE vulnerability after Patch Tuesday delay

Google's Project Zero team has disclosed a potential arbitrary code execution vulnerability in Internet Explorer because Microsoft has not acted within Google's 90-day disclosure deadline. Read More

Thumbnail Image

3 security analytics approaches that don’t work (but could) — Part 2

Security analytics approaches using the strengths of Bayesian networks, machine learning and rules-based systems can be vital if they are thoughtfully built, combined and applied. Read More

Thumbnail Image

Cloudflare bug exposed passwords, other sensitive data from websites

For months a bug in Cloudflare's content optimization systems exposed sensitive information sent by users to websites including passwords, session cookies, authentication tokens and even private messages. Read More

Thumbnail Image

I come to bury SHA1, not to praise it

Google and CWI prove vulnerability with the first SHA1 hash collision, which will accelerate adoption of SHA-256. Read More

Thumbnail Image

Fraud rises as cybercriminals flock to online lenders

The latest quarterly ThreatMetrix Cybercrime Report shows 1 million cyberattacks targeted online lending transactions throughout 2016, causing estimated losses of more than $10 billion. Read More

Thumbnail Image

Cisco unveils Hierarchy of Needs for the digital enterprise

Security, the cloud and automation are the foundation of Cisco’s Hierarchy of Needs, a guide to become a digital enterprise. Read More

White Paper: Google

The Business Value of Chrome Devices in Kiosk Mode

Customers and employees expect a high level of interaction with businesses today. Organizations have managed these types of experiences using PCs in public and employee spaces, running kiosk software. PCs can be inherently hard and time consuming to manage in an open environment. Devices running Google's Chrome operating system (OS) offer a fast-booting, always-updated, and highly secure OS. Download the white paper to learn more. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

7 features Linux could borrow from other systems

12 steps to small business security Read More

Most-Read Stories

1. Battle of the clouds: Amazon Web Services vs. Microsoft Azure vs. Google Cloud platform
2. Three technologies that could demolish slow internet
3. Stop using SHA1: It’s now completely unsafe
4. How would you handle these tough job interview questions from tech companies
5. Apple Watch Series 3 Rumor Rollup: New display, more energy & watchOS beta 32
6. Brocade's Ruckus Wi-Fi business finds a buyer
7. 7 free tools every network needs
8. 4 things we expect from Mobile World Congress 2017
9. 19 free cloud storage options
10. Cisco touts next-gen firewall gear for midsize installations
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.