|
|
Newsletter | Network World

Iris scans as ID grow in use

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Sep 05, 2016
Featured Image

Regular password changes make things worse

Changing passwords is supposed to make things more difficult for attackers. Unfortunately, research shows that human nature means it makes it easier. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Iris scans as ID grow in use
Microsoft bug bounty program adds .NET Core and ASP.NET Core
Apple quashes 3 zero-days with emergency Mac update
VMworld: My Cybersecurity-Centric Impressions
Your strategy for dealing with web bots has to take into accout business context
Suspect arrested in 5-year-old kernel.org breach
FBI: Bank robbery? There’s an app for that
Cisco: Potent ransomware is targeting the enterprise at a scary rate
“Guccifer” gets 52 months in prison for hacking crimes

Video/Webcast: Armor

Is your Enterprise Data Secure From the Inside Out?

Protecting your organization's critical private data has become increasingly difficult as hackers create more clever and technically advanced threats. As a result, it's time to think about new ways to structure your organization's security response. Read More

Thumbnail Image

Iris scans as ID grow in use

Iris scanner technology is emerging in smartphones, including the new Samsung Note 7, but is expected to come soon to cars and ATM machines to verify a user’s identity. Read More

Thumbnail Image

Microsoft bug bounty program adds .NET Core and ASP.NET Core

Microsoft has expanded its bug bounty programs to cover its open-source .NET Core and ASP.NET Core application development platforms. Read More

Thumbnail Image

Apple quashes 3 zero-days with emergency Mac update

Apple on Thursday issued an emergency security update for the Mac, patching the same trio of vulnerabilities the company already fixed on the iPhone. Read More

VMworld: My Cybersecurity-Centric Impressions

NSX security is gaining traction in the VMware installed based but the story remains confusing to cybersecurity professionals. VMware needs to bolster its NSX security go-to-market initiatives to scale to the next level Read More

Your strategy for dealing with web bots has to take into accout business context

Simply blocking all bot visits can end up hurting your business Read More

Thumbnail Image

Suspect arrested in 5-year-old kernel.org breach

Five years after a security breach forced the Linux Foundation to take kernel.org offline and to rebuild several of its servers, police have arrested a suspect in the case. Read More

Thumbnail Image

FBI: Bank robbery? There’s an app for that

The Bank Robbers application runs on iPhones and iPads (Apple iTunes) as well as Android smartphones (Google Play) and lets users sort bank robberies by the date they occurred, the category they fall under (i.e., armed serial bank robber), the FBI field office working the case, or the state where the robbery occurred. Read More

Thumbnail Image

Cisco: Potent ransomware is targeting the enterprise at a scary rate

Enterprise targeting cyber enemies are deploying vast amounts of potent ransomware to generate revenue and huge profits – nearly $34 million annually according to Cisco’s Mid-Year Cybersecurity Report out this week. Ransomware, Cisco wrote, has become a particularly effective moneymaker, and enterprise users appear to be the preferred target. Read More

Thumbnail Image

“Guccifer” gets 52 months in prison for hacking crimes

Guccifer hacked former U.S. Secretary of State Colin Powell as well as a the daughter of former President George H.W. Bush but lied about hacking into Hillary Clinton's email server Read More

White Paper: CenturyLink

Mitigating Branch Office Risks with Software-Defined Security

Branch office and remote site networks can be vulnerable to security threats due to complex security requirements and variables that make it challenging for enterprises to manage. That's the bad news. The good news is that software-defined technology now available with SD-WAN can significantly improve the deployment and management of security at the branch. Get the deep dive on how. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

10 sci-fi technologies we are close to having

Linux at 25: A retrospective Read More

Most-Read Stories

1. Windows 10 growth slowdown has bright side
2. Microsoft sets Windows 10 subscriptions at $7
3. 19 free cloud storage options
4. 14 hot network jobs, skills for 2017
5. 10 under-the-radar software products users
6. Computer science salaries rise with demand for new graduates
7. “Guccifer” gets 52 months in prison for hacking crimes
8. 7 free tools every network needs
9. Phone 7 preview: Everything Apple will announce
10. 1,650lb 3D printed aircraft tool sets Guinness World Record
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as @email@.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.