Settling scores with risk scoring

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

May 10, 2017
Featured Image
INSIDER

What it takes to be a security architect

While the path to security architect varies, anyone considering the role should have a passion for IT infrastructure and protecting data. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Settling scores with risk scoring
Verizon taps into open source, white box fervor with new CPE offering
Why smart contracts can't be fully automated
FBI/IC3: Vile $5B business e-mail scam continues to breed
FCC should produce logs to prove ‘multiple DDoS attacks’ stopped net neutrality comments
Vendors approve of NIST password draft
The rise of enterprise-class cybersecurity vendors
Microsoft fixes remote hacking flaw in Windows Malware Protection Engine

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Settling scores with risk scoring

Risk scores seem all the rage right now. Executives want to know what their risk is. The problem is we haven’t developed a good way to measure risk. Read More

Thumbnail Image

Verizon taps into open source, white box fervor with new CPE offering

Verizon this week said it would begin offering x86-based servers with OpenStack software aimed at customers looking to support all manner of advanced cloud, software defined networking and network functions virtualization (NSF)-based enterprises. Read More

Thumbnail Image

Why smart contracts can't be fully automated

Smart contracts, enabled by blockchain technology, have the potential to streamline all manner of transactions. But most of them will still require humans in the middle. Read More

Thumbnail Image

FBI/IC3: Vile $5B business e-mail scam continues to breed

The FBI’s Internet Crime Complaint Center (IC3) this week said the plague it calls the Business Email Compromise continues to rack-up victims and money – over 40,000 worldwide victims and $5 billion in the latest count. Read More

Thumbnail Image

FCC should produce logs to prove ‘multiple DDoS attacks’ stopped net neutrality comments

Fight for the Future says the FCC should produce its logs to prove its claim that "multiple DDoS attacks" silenced net neutrality comments. Read More

Thumbnail Image

Vendors approve of NIST password draft

The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies for their companies. Read More

The rise of enterprise-class cybersecurity vendors

Cybersecurity professionals say enterprise-class cybersecurity vendors must offer industry experience, support for IT initiatives and a commitment to streamline security operations. Read More

Thumbnail Image

Microsoft fixes remote hacking flaw in Windows Malware Protection Engine

Microsoft released an update for the malware scanning engine bundled with most of its Windows security products to fix a highly critical vulnerability that could allow attackers to hack computers. Read More

eBook: Silver Peak Systems Inc

6 Ways to Improve Your Network Security with SD-WAN

With the right SD-WAN solution, broadband internet service are secure enough for the enterprise. Read this eBook to learn six ways to use a secure SD-WAN solution to improve network security and compliance. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

25 geek-inspired gifts for Mother's Day

Cool ways to celebrate Star Wars Day Read More

Most-Read Stories

1. Google Project Zero researchers find ‘crazy bad’ Windows RCE that is wormable
2. FBI/IC3: Vile $5B business e-mail scam continues to breed
3. 18 free cloud storage options
4. Intel sold you out
5. 7 things Microsoft left out of Windows 10
6. Hot jobs of the future
7. How Forbes inadvertently proved the anti-malware value of ad blocker advertisements
8. 10 super-user tricks to boost Windows 10 productivity
9. FCC hit with DDoS attacks after John Oliver takes on net neutrality
10. ‘Found a leaky ethernet port’
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.