Advertisements


IDG Contributor Network: Machine learning: Are we there yet?

In my recent blogs, I have written about automation tying the network to other domains of IT, and how it’s a capability available today that you should start using.Machine learning is another hot topic. While the timeline is several years out fo.....»»

Source:  NetworkworldCategory: Network16 hr. 0 min. ago Related News

EternalRocks network worm uses 7 NSA hacking tools

While you won’t be forgetting the WannaCry ransomware attack, it is likely you will be hearing a lot more about the alleged NSA-linked EternalBlue exploit and DoublePulsar backdoor, as it seems a wide range of bad guys have them in their toy box.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

New products of the week 5.22.17

Running its courseImage by UntangleNetwork World's long-running product of the week slideshow has come to an end with this edition. Vendors are still welcome to discuss their products with reporters. Thank you to all who have submitted products. Cyp.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

Splunk on SOAPA (part 1)

I’ve written a lot about ESG’s security operations and analytics platform architecture (SOAPA).  SOAPA is happening because enterprise organizations are surrounding SIEM with lots of other security analytics and operations tools to accelerate.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

Netgear NightHawk R7000 routers now collect user data

Netgear makes some popular routers, but do you really want the company behind your model of router to collect data such as your IP address and MAC address? If the answer is no, then you need to disable the "analytics" data collection.Netgear’s N.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

Hackers easily trick iris scanner to unlock Samsung Galaxy S8

When it comes to security and the iris recognition technology used in its flagship Galaxy S8 smartphone, Samsung touted, “The patterns in your irises are unique to you and are virtually impossible to replicate, meaning iris authentication is one.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

IDG Contributor Network: How quantum computing increases cybersecurity risks

Imagine you wake up one morning, assuming everything is as you left it the night before. But overnight, attackers with a quantum computer capable of breaking current cryptography standards have targeted millions of people and stolen their personal.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

IDG Contributor Network: How security executives can feel comfortable in the boardroom and server room

With information security being a major concern at all companies, successful security executives need to be equally comfortable in the boardroom and the server room. While being well-versed in traditional security duties, like developing incident.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

IDG Contributor Network: Educating the public about security – are we doing it all wrong?

In 2016 consumers were exposed to a larger number of high profile data breaches than any year previously. According to the Breach Level Index, 1,792 data breaches led to almost 1.4 million data records being compromised worldwide, an increase of 8.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

IDG Contributor Network: How quantum computing increases cybersecurity risks

Imagine you wake up one morning, assuming everything is as you left it the night before. But overnight, attackers with a quantum computer capable of breaking current cryptography standards have targeted millions of people and stolen their personal.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

IDG Contributor Network: How security executives can feel comfortable in the boardroom and server room

With information security being a major concern at all companies, successful security executives need to be equally comfortable in the boardroom and the server room. While being well-versed in traditional security duties, like developing incident.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

IDG Contributor Network: Educating the public about security – are we doing it all wrong?

In 2016 consumers were exposed to a larger number of high profile data breaches than any year previously. According to the Breach Level Index, 1,792 data breaches led to almost 1.4 million data records being compromised worldwide, an increase of 8.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

IDG Contributor Network: Do you know where your data is?

Modern businesses must be agile, flexible and innovative. Business leaders are always looking for the next opportunity and speed is of the essence. Whether they’re looking to scale up quickly for a new project, or seeking to harness the benefits.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

IDG Contributor Network: SD-WANs lost my voice

If there’s one application that brings chills to the hearts of SD-WAN implementers it’s providing a predictable real-time voice service. So let’s talk about how SD-WANs might help.The problem with voice We need to separate from the theory of.....»»

Source:  NetworkworldCategory: NetworkMay 23rd, 2017Related News

Yes, you still need endpoint malware protection

There has been a steady stream of reports and claims lately that many of us no longer need endpoint security, that antivirus (AV) programs on our PCs are worthless.Gizmodo flat out said that you really don't need an antivirus app anymore, arguing.....»»

Source:  NetworkworldCategory: SecurityMay 19th, 2017Related News

How to maintain data oversight to avoid ‘shadow data’

Data at riskImage by George HodanBefore his retirement, an employee of the Office of the Comptroller of the Currency (OCC) uploaded more than 10,000 OCC records onto two removable thumb drives. He retired in November 2015; the agency didn’t discove.....»»

Source:  NetworkworldCategory: SecurityMay 19th, 2017Related News

Yes, you still need endpoint malware protection

There has been a steady stream of reports and claims lately that many of us no longer need endpoint security, that antivirus (AV) programs on our PCs are worthless.Gizmodo flat out said that you really don't need an antivirus app anymore, arguing.....»»

Source:  NetworkworldCategory: SecurityMay 19th, 2017Related News

How to maintain data oversight to avoid ‘shadow data’

Data at riskImage by George HodanBefore his retirement, an employee of the Office of the Comptroller of the Currency (OCC) uploaded more than 10,000 OCC records onto two removable thumb drives. He retired in November 2015; the agency didn’t discove.....»»

Source:  NetworkworldCategory: SecurityMay 19th, 2017Related News

The modern guide to staying safe online

The internet can be a scary place. Threats come in many forms, lurking in practically any corner. Worse, yesterday’s prevailing advice for staying safe online -- avoid dodgy websites, don’t traffic in stolen or illegal goods, interact only wit.....»»

Source:  NetworkworldCategory: SecurityMay 19th, 2017Related News

IDG Contributor Network: Use wired networks for Gigabit, not Wi-Fi

Thousand megabit broadband is a turning point for internet delivery speeds. Newer tech, such as virtual reality, and the incumbents, such as video streaming, will benefit. Right now, though, only about 17 percent of the U.S.’s population has acc.....»»

Source:  NetworkworldCategory: NetworkMay 19th, 2017Related News