How to train new grads on corporate security

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Jul 15, 2016
Featured Image

What’s hot at Cisco Live!

Cisco security heats up, as does relationship with VMware; all about chat bots, Maroon 5 and Elle King too. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to train new grads on corporate security
Cybersecurity is only as strong as your weakest link—your employees
How to prepare for a data breach  
Defective products could result from cyberattacks on industrial 3D printers
New Locky ransomware version can operate in offline mode
$29.99 for the IT Security & Ethical Hacking Certification Training ($1,895 value) - Deal Alert
A surge of Pokemon Go-related apps is out to steal your data
Security Sessions: Protecting data at the endpoint
Juniper patches high-risk flaws in Junos OS

White Paper: CDW Corporation

Trend Micro and Microsoft: A Powerful Security Partnership

Trend Micro provides enterprise IT teams with a wide range of solutions that are specifically developed to enhance the security of Microsoft platforms and products. Trend Micro's products range from traditional anti-malware solutions to cloud-centric intrusion detection and prevention packages. IT professionals adopting Trend Micro solutions benefit from the company's long-standing partnership with Microsoft. Read More

Thumbnail Image
INSIDER

How to train new grads on corporate security

If you plan on hiring new grads this summer, you'll want to make sure you get them up to speed on the importance of corporate security as soon as possible -- because they aren’t as savvy as they think. Read More

Thumbnail Image

Cybersecurity is only as strong as your weakest link—your employees

Stay on top of account management and assess staff cybersecurity skills with CIS Controls 16 and 17. Read More

How to prepare for a data breach  

The impact of a breach can be lessened if an organization is well prepared to respond quickly. The head of Experian's Data Breach Resolution group advises how Read More

Thumbnail Image

Defective products could result from cyberattacks on industrial 3D printers

With the growth of Internet-connected 3D printers, researchers say there's a threat of hackers tweaking manufacturing specifications and introducing defects that affect the reliability of parts for numerous industries. Read More

Thumbnail Image

New Locky ransomware version can operate in offline mode

The creators of the widespread Locky ransomware have added a fallback mechanism in the latest version of their program for situations where the malware can't reach their command-and-control servers. Read More

Thumbnail Image

$29.99 for the IT Security & Ethical Hacking Certification Training ($1,895 value) - Deal Alert

For a limited time, the bundle of courses is only $29.99 and jam-packed with over 48 hours of courses and 50 hours of advanced training. Read More

Thumbnail Image

A surge of Pokemon Go-related apps is out to steal your data

Since the Pokemon Go game launched last week, a throng of unofficial apps have tried to piggyback on the title’s success. And many of them are hungry for users’ private information. Read More

Thumbnail Image
Video

Security Sessions: Protecting data at the endpoint

In this episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks with Brett Hansen, executive director of Data Security Solutions at Dell, about keeping data safe in an increasingly mobile world. Watch Now

Thumbnail Image

Juniper patches high-risk flaws in Junos OS

Juniper Networks has fixed several vulnerabilities in the Junos operating system that's used on its networking and security appliances, including a flaw that could allow hackers to gain administrative access to affected devices. Read More

White Paper: Endgame Systems

Automate the Hunt for Hidden Threats Within Your Enterprise

Medicine is helpful only if you understand what is wrong with the person and provide the proper remedy. The wrong medicine does no good and, in some cases, can make things worse. In a similar vein, many organizations spend lots of money on security but fail to apply remedies that make it harder for adversaries and control the damage caused by attacks. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Integration projects that went terribly wrong

10 advanced endpoint protection tools Read More

Most-Read Stories

1. One year after its demise, Windows Server 2003
2. Who’s right behind Amazon in IaaS cloud revenue?
3. 19 free cloud storage options
4. Is Wi-Fi finally ‘fast enough?’
5. July 2016 Patch Tuesday: Microsoft releases 11 security updates, 6 rated critical
6. Why 50 million people can't call 911
7. 2016 technology industry graveyard
8. Feds to hire 3,500 cybersecurity pros by year's end
9. 6 high-tech ways thieves can steal connected cars
10. 7 free tools every network needs
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.