Security Sessions: The state of cloud security

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jul 11, 2016

Stuxnet the movie: The U.S. has pwned Iran

The new documentary about Stuxnet, ‘Zero Days’, says the U.S. had a far larger cyber operation against Iran called Nitro Zeus that has compromised the country’s infrastructure and could be used as a weapon in any future war. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Security Sessions: The state of cloud security
Antivirus merger: Avast offers $1.3 billion for AVG
Car hacking: Thieves armed with laptops are stealing cars
New Mac backdoor program steals keychain contents
FTC warning: The IRS does not accept payment in iTunes cards
Researchers add software bugs to reduce the number of… software bugs
How to secure your router and home network
Google hopes to thwart quantum computers from cracking today's internet encryption

White Paper: Dell - Quest Software

Adaptive, Risk-Based Security - The 5 Ws of Access

Security is a moving target. To play it safe, you err on the side of a static approach but users complain that it's restrictive. If your security could adapt to the context of user access, then you could provide the access they need without worrying about stolen user credentials. Read More

Thumbnail Image
Video

Security Sessions: The state of cloud security

In this episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with Jim Reavis, CEO of the Cloud Security Alliance, about whether enterprises have finally trusted cloud services for their corporate data, and how the Internet of Things could affect cloud security in the future. Watch Now

Thumbnail Image

Antivirus merger: Avast offers $1.3 billion for AVG

Antivirus vendor Avast Software has agreed to buy rival AVG Technologies for US$1.3 billion in cash. Read More

Thumbnail Image

Car hacking: Thieves armed with laptops are stealing cars

Officials warn of a 'new' high-tech method thieves are using to steal cars: using laptops to hack car ignitions. Read More

Thumbnail Image

New Mac backdoor program steals keychain contents

Researchers have identified a new Mac backdoor program that's designed to steal credentials stored in the OS encrypted keychain and give attackers control over the system. Read More

Thumbnail Image

FTC warning: The IRS does not accept payment in iTunes cards

The FTC issued a warning today about a scam that sounds ridiculous but is nonetheless surprisingly common: Con artists are convincing victims that they’re from the IRS and will accept outstanding payments in the form of iTunes cards. Read More

Thumbnail Image

Researchers add software bugs to reduce the number of… software bugs

A new strategy for training bug-finding tools could help catch more vulnerabilities. Read More

Thumbnail Image

How to secure your router and home network

Many users don't realize it, but their internet router is the most important electronic device in their home and is an attractive target for attackers. Read More

Thumbnail Image

Google hopes to thwart quantum computers from cracking today's internet encryption

The encryption methods used to secure today’s internet won’t be impenetrable forever. More powerful “quantum computers” in the future could very well crack them. Read More

White Paper: Trend Micro Incorporated

Charting a New Course for IT Security with Coordinated Threat Defenses

Effectively thwarting modern malware and targeted attacks requires a new level of integration and coordination among traditional domain-level controls and next-generation, centralized security analysis, correlation, and management systems. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

9 Raspberry Pi programming tools bundled with Raspbian

When tech and fashion collide Read More

Most-Read Stories

1. Researchers add software bugs to reduce the number of… software bugs
2. Who needs a GUI? How to live in a Linux terminal
3. MOOCs put a new spin on professional development
4. Wendy's hack was bigger than thought and exposed credit card data
5. 19 free cloud storage options
6. Facebook to launch OpenCellular, an open-source mobile networking framework
7. Microsoft could overtake Amazon in the cloud, Morgan Stanley survey finds
8. Intel scales back Android development
9. Google hopes to thwart quantum computers from cracking today's internet encryption
10. Microsoft targets the iMac with new PCs, reports say
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.