How to get started in IT security consulting

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Compliance Alert

Mar 18, 2016
Featured Image

Wi-Fi hotspot blocking persists despite FCC crackdown

The FCC has slapped hotels and other organizations with nearly $2.1 million in fines since the fall of 2014 for blocking patrons’ portable Wi-Fi hotspots in the name of IT security, or more likely, to gouge customers for Internet service. But Network World’s examination of more than a year’s worth of consumer complaints to the FCC about Wi-Fi jamming shows that not all venue operators are getting the message. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to get started in IT security consulting
Comedians find Apple-FBI standoff a laughing matter (watch videos)
How far have we come with HTTPS? Google turns on the spotlight
IT is getting cloud storage security all wrong
ISPs aren't telling customers their router is a public hotspot
Attack campaign uses keylogger to hijack key business email accounts
BYOD isn’t going away, so set a real strategy
Georgia loves the cloud, but now needs it to be HIPAA compliant
How to manage the risks and costs of software compliance

White Paper: Dell

Dell Storage Family Portfolio Brochure

Legacy storage architectures have historically been complex and costly with data rigidly coupled to hardware and frequent vendor-induced upgrades of both equipment and software licensing. Read More

Thumbnail Image
INSIDER

How to get started in IT security consulting

IT security consulting is an excellent way to grow as a security professional. In contrast to an corporate role, consultants are exposed to a variety of business situations and industries. Those who succeed in the consulting world find themselves equipped with greater skills and cutting edge knowledge of new technologies. Read More

Thumbnail Image

Comedians find Apple-FBI standoff a laughing matter (watch videos)

Colbert, Oliver, Bee & others get laughs from iPhone encryption brouhaha Read More

Thumbnail Image

How far have we come with HTTPS? Google turns on the spotlight

Aiming to shed some light on how much progress has been made so far, Google on Tuesday launched a new section of its transparency report dedicated to encryption. Read More

Thumbnail Image

IT is getting cloud storage security all wrong

Two recent reports confirm that your greatest security threat is your users, not outside hackers. Read More

Thumbnail Image

ISPs aren't telling customers their router is a public hotspot

ISPs are about to be inundated by irate customers not happy about public router sharing, a research firm thinks. One issue: not being straight about it. Read More

Thumbnail Image

Attack campaign uses keylogger to hijack key business email accounts

A new email-based attack campaign is targeting key employees from companies in the US, Middle East and Asia with the goal of compromising their computers and email accounts. Read More

Thumbnail Image
INSIDER

BYOD isn’t going away, so set a real strategy

Users are going to use their devices for work, no matter what you do. That’s why you need a policy that manages the considerable risks. (Insider; registration required) Read More

Thumbnail Image

Georgia loves the cloud, but now needs it to be HIPAA compliant

Cloud service providers are evolving their platforms to handle personal health information that’s subject to HIPAA regulations, as seen in this case study about the state of Georgia’s Google cloud use. Read More

Thumbnail Image

How to manage the risks and costs of software compliance

Software compliance can be a tricky – and expensive – challenge for most IT leaders. Luckily, tech solutions let you manage software assets. Read More

White Paper: Dell

Driving Business Value with Flash-Optimized Dell Storage Solutions

Getting the best from a virtualized environment is a vital concern for IT managers struggling to deal with shrinking budgets, fewer staff, and other pressures brought about by the tough financial climate. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

11 highest paying tech jobs in America

7 VPN services for hotspot protection Read More

Most-Read Stories

1. DreamHost replaces VMware SDN with open source for big savings
2. 10 hard-core coding tips for faster Python
3. 19 free cloud storage options
4. Lenovo demands Microsoft extend Skylake Windows 7 support
5. How far have we come with HTTPS? Google turns on the spotlight
6. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
7. Steam Stealer malware provides a thriving business for cyber thugs
8. 7 free tools every network needs
9. 40 virtual reality predictions
10. ISPs aren't telling customers their router is a public hotspots
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Compliance Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.