|
Video/Webcast: CDW Corporation When mobile technology turns into an IT environment where "anything goes", the potential problems are substantial. Organizations of all kinds need mobility management tools that allow users to be productive and IT to regain needed control. Microsoft's Azure Enterprise Mobility Suite (EMS) provides the management and data security tools necessary to protect the organization and enable end users. Read More ▶ |
Following the massive DDoS attack that last month that targeted DNS provider Dyn and temporarily knocked Twitter, Netflix and other big names off the Internet, we were bombarded with pitches from vendors begging to offer their expert opinions on the matter while extolling the virtues of their solutions that naturally would have safeguarded organizations. Read More ▶ |
|
IBM says the platform, called Project Intu lets Project Intu offers developers easily build cognitive or basically machine learning skills into a wide variety of operating systems – from Raspberry PI to MacOS, Windows to Linux devices. Devices using Intu can “interact more naturally with users, triggering different emotions and behaviors and creating more meaningful and immersive experience for users. Developers can simplify and integrate Watson services, such as Conversation, speech-to-text, Language and Visual Recognition, with the capabilities of the “device” to, in essence, act out the interaction with the user,” IBM stated Read More ▶ |
|
|
Microsoft released 14 security updates, six rated critical, and a fix for the 0-day disclosed by Google. Read More ▶ |
|
Adobe Systems released security patches for its widely used Flash Player software as well as its Adobe Connect web conferencing platform that's popular in enterprise environments. Read More ▶ |
|
In Bryan Lunduke’s ongoing quest to make his digital life as secure and private as possible, he’s found three instant messaging networks worth talking about. Read More ▶ |
|
A $1.8 million Integrated Security Operations Center, opened in late 2015, consolidates threat intelligence from what previously was carried out in four different locations. Read More ▶ |
|
Madison County Commissioners unanimously agreed to pay the ransom. Read More ▶ |
|
If you ever wonder why phishing scammers continue to try myriad ways of ripping people off you need look no further than this. The El Paso Times this week reported that the city had been scammed out of $3.2 million through a phishing scheme that targeted municipality’s street car development program. Read More ▶ |
|
White Paper: GlobalSCAPE Are you making it too easy for hackers to infiltrate your system? If your employees are using unsanctioned devices and applications, then the answer is yes! Unsanctioned devices and applications can leave your IT infrastructure and data far more vulnerable to being exploited by cybercriminals. Unfortunately, it's become easier than ever for employees to access rogue applications, much to the chagrin of busy IT staff. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS Brace yourselves, commercial drones are coming Read More ▶ |
Most-Read Stories |