Network World Security Alert |
| |
|
Spam is once again raising its ugly head as a chief way for attackers to grab protected data. IBM’s X-Force Threat Intelligence group said today that one of the key findings from its forthcoming Threat Intelligence Index for 2017 is that spam volume grew dramatically throughout 2016, bringing with its host of new malicious attachments harboring banking Trojans and ransomware. Read More ▶ |
|
| Solution Center: Rapid7 When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More ▶ | Can your business get by with an asynchronous backup or must that offsite server be updated by the second to keep the business up and running at all times. Read More ▶ |
| That was fast. Networking veteran Jonathan Davidson is re-joining Cisco a little less than a week after resigning as rival Juniper executive VP and general manager. Davidson is joining Cisco’s Service Provider Business Unit and will report to Yvette Kanouff, the senior vice president and general manager that unit. +More on Network World: Cisco’s Jasper deal – one year, 18 million new IoT devices later, challenges remain+ Read More ▶ |
| | The W-2 scam provides another example of how a security awareness program that adapts to trending threats has an advantage over a one-size-fits-all plan. Read More ▶ |
| In this review, we looked at five email encryption products, four of which employ encryption gateways and one that’s end-to-end. The gateways usually rely on plug-ins to Outlook and browsers so you can continue using your existing email clients. The end-to-end product requires new clients for all encrypted message traffic. Read More ▶ |
| Rapid7 discovered three flaws in Double Robotics' Double 2 telepresence robots. Read More ▶ |
| Ransomware has exploded onto the PC. We'll show you what to do to avoid it, remove it, and—if necessary—even negotiate with its authors. Read More ▶ |
| Google, Apple, Microsoft and other software vendors are working to identify and patch the vulnerabilities described in the CIA leak, but ultimately this doesn't change the status quo of software security. Read More ▶ |
| Video/Webcast: TITUS Successful digital transformation requires organizations to keep up with an unprecedented pace of change. Collaboration tools may help employees meet the challenge, but do workers understand the value of the information they are sharing, and more importantly, their role in protecting it? Read More ▶ | Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ | SLIDESHOWS Coolest new Android phones at Mobile World Congress 2017 Read More ▶ | Most-Read Stories |
|
|
|