What it takes to be a security architect

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Compliance Alert

May 12, 2017
Featured Image

You really should know what the Andrew File System is

It's a good bet that most cloud computing devotees have no idea what the Andrew File System (AFS) is, though this foundation technology just earned its creators a major Association for Computing Machinery award and accompanying $35K prize Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What it takes to be a security architect
Staples hires its very first CISO
Check Point boosts cloud-security education to help IT security pros stay relevant
Cisco patches critical IOS security fault found after CIA WikiLeaks dump
Artificial intelligence tool fixes password weakness
Another IoT botnet with pieces of Mirai embedded can do DDoS from 100k devices
Some HP PCs are recording your keystrokes
SIEM remains an enterprise security architecture requirement
Latest firmware updates for Asus routers fix CSRF security flaws

Video/Webcast: CDW | EMC

Digital Transformation Calls for New Data Center Solutions

We're in the midst of the third industrial revolution -- the era of digital business. Big data analytics and the Internet of Things are giving rise to new digital business strategies. In this webcast, you will learn how converged infrastructure, built on such technologies as virtualization and flash storage, is enabling businesses to successfully achieve digital transformation. Read More

Thumbnail Image
INSIDER

What it takes to be a security architect

While the path to security architect varies, anyone considering the role should have a passion for IT infrastructure and protecting data. Read More

Thumbnail Image

Staples hires its very first CISO

Staples has hired its first chief information security officer (CISO), a key new member of the office supply giant's team that combines traditional IT and digital transformation. Read More

Thumbnail Image

Check Point boosts cloud-security education to help IT security pros stay relevant

Check Point is investing heavily in educating IT pros about the cloud, not only to promote their own cloud security products but to give potential customers the skills they’ll need to keep their jobs as their employers move more and more resources to public cloud providers. Read More

Thumbnail Image

Cisco patches critical IOS security fault found after CIA WikiLeaks dump

Cisco this week said it patched a critical vulnerability in its widely deployed IOS software that was disclosed in the WikiLeaks dump of CIA exploits earlier this year. Read More

Thumbnail Image

Artificial intelligence tool fixes password weakness

Simply labeling a password weak or strong doesn’t work. Password meters must tell people what’s wrong with their password and suggest fixes. AI can do that. Read More

Thumbnail Image

Another IoT botnet with pieces of Mirai embedded can do DDoS from 100k devices

Bot-herding software called Persirai, which incorporates pieces of the Mirai botnet code, can commandeer significant chunks of a known 150,000 IP cameras that are vulnerable to Mirai and use them to fire off distributed denial-of-service attacks. Read More

Thumbnail Image

Some HP PCs are recording your keystrokes

Security company Modzero found a program acting as a keylogger in certain HP PCs. Read More

SIEM remains an enterprise security architecture requirement

Enterprise-class cybersecurity technology vendors must offer SIEM software, security analytics, and operations capabilities or have strong SIEM partners. Read More

Thumbnail Image

Latest firmware updates for Asus routers fix CSRF security flaws

Users of Asus RT-N and RT-AC series routers should install the latest firmware updates released for their models because they address vulnerabilities that could allow attackers to hijack router settings. Read More

White Paper: Symantec

IDC MarketScape: Worldwide Endpoint Specialized Threat Analysis and Protection 2017 Vendor Assessment

The market is flooded with endpoint security technologies, incident response tools, threat intelligence feeds, and behavioral analytics. Know what the key requirements are before shopping for modern endpoint threat detection, prevention and/or response, and remediation solutions. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

25 geek-inspired gifts for Mother's Day

Cool ways to celebrate Star Wars Day Read More

Most-Read Stories

1. Cisco patches critical IOS security fault found after CIA Wikileaks dump
2. You really should know what the Andrew File System is
3. Hottest news from OpenStack Summit
4. 18 free cloud storage options
5. Google I/O 2017: AI, IoT and VR/AR predictions
6. 7 free tools every network needs
7. FCC should produce logs to prove ‘multiple DDoS attacks stopped Net neutrality comments
8. Cisco taps into AI, collaboration with $125M Mindmeld buy
9. First iPhone 7s rumor points to Ion-X glass on the rear casing
10. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Compliance Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.