|
Solution Center: Rapid7 When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More ▶ |
Cisco has for a few years now touted software over its hardware powers but with this week’s AppDynamics buy it may have broken out of its traditional bailiwick for good. Read More ▶ |
|
Chrome and Firefox will warn you when you try to login to a site without HTTPS. Read More ▶ |
|
|
Tired of conventional passwords? So is Nuance Communication, a tech firm that is promoting the human voice as a way to secure user accounts. Read More ▶ |
|
Aditya K Sood, PhD, Director of Security and Cloud Threat Labs, Blue Coat Systems, a part of Symantec, details how cybercriminals can obtain sensitive data, like credit card numbers, names and addresses, with just a couple of clicks and a payment. Read More ▶ |
|
In a year marked by massive data breaches, trends report finds skimming and phishing made waves in 2016. Read More ▶ |
|
Starting February 13, Google will no longer allow JavaScript attachments on its Gmail service, killing one of the main methods of malware distribution over the past two years. Read More ▶ |
|
Considering identity and access management (IAM) software? Download this free report for side-by-side comparisons of rival products from Oracle and CA, based on reviews written by enterprise users of the products. Read More ▶ |
|
The Air Force Research Lab (AFRL) tapped into that notion today as it awarded a $750,000 grant to security systems developer Galois to develop a cyber deception system that will “dramatically reduce the capabilities of an attacker that has gained a foothold on a network.” Read More ▶ |
|
Interestingly the TSA finds some amusement or amazement in these finding as it now posts its own Top 10 Most Unusual Finds which outlines the most “dangerous and often times wacky items” it has kept off commercial airliners. Read More ▶ |
|
eBook: Safebreach Can you answer the question "Are we secure?" If you're only as strong as your security defenses, understanding how well the controls that you've deployed will stand up to attackers is critical. This eBook looks at how breach simulations can quantify your security risks and continuously validate the efficacy of your security controls. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS 10 amazing Raspberry Pi clusters Read More ▶ |
Most-Read Stories |