Advertisements


Splunk"s position on SOAPA – Part 1

I’ve written a lot about ESG’s security operations and analytics platform architecture (SOAPA). SOAPA is happening because enterprise organizations are surrounding SIEM with lots of other security analytics and operations tools to accelerate i.....»»

Source:  NetworkworldCategory: SecurityMay 25th, 2017Related News

Hackers trick iris scanner to unlock Samsung Galaxy S8

When it comes to security and the iris recognition technology used in its flagship Galaxy S8 smartphone, Samsung touted, “The patterns in your irises are unique to you and are virtually impossible to replicate, meaning iris authentication is one.....»»

Source:  NetworkworldCategory: SecurityMay 25th, 2017Related News

Cisco: Secure IoT networks, not the devices

With networking pros unable to trust the security of Internet of Things devices, Cisco says they should focus on implementing network-based security protections that limit the blast radius of IoT security breaches.This week Cisco unveiled a new pa.....»»

Source:  NetworkworldCategory: SecurityMay 25th, 2017Related News

Hackers can use malicious subtitles to remotely take control of your device

Do you use Kodi, Popcorn Time, VLC or Stremio? Do you use subtitles while you watch? If so, then you need to update the platform as Check Point researchers revealed that not all subtitles are benign text files and hackers can remotely take control.....»»

Source:  NetworkworldCategory: SecurityMay 25th, 2017Related News

Gravityscan, keeping WordPress sites safe

If your website, in common with roughly 25% of all websites, is running WordPress then it's pretty much certain that it's being constantly attacked. WordPress is to hackers what raw meat is to jackals because unless sites are assiduously maintaine.....»»

Source:  NetworkworldCategory: SecurityMay 25th, 2017Related News

Gravityscan, keeping WordPress sites safe

If your website, in common with roughly 25% of all websites, is running WordPress then it's pretty much certain that it's being constantly attacked. WordPress is to hackers what raw meat is to jackals because unless sites are assiduously maintaine.....»»

Source:  NetworkworldCategory: SecurityMay 25th, 2017Related News

Hackers can use malicious subtitles to remotely take control of your device

Do you use Kodi, Popcorn Time, VLC or Stremio? Do you use subtitles while you watch? If so, then you need to update the platform as Check Point researchers revealed that not all subtitles are benign text files and hackers can remotely take control.....»»

Source:  NetworkworldCategory: SecurityMay 25th, 2017Related News

Gravityscan, keeping WordPress sites safe

If your website, in common with roughly 25% of all websites, is running WordPress then it's pretty much certain that it's being constantly attacked. WordPress is to hackers what raw meat is to jackals because unless sites are assiduously maintaine.....»»

Source:  NetworkworldCategory: SecurityMay 25th, 2017Related News

How to conduct an IoT pen test

Penetration testing was much like taking a battering ram to the door of the fortress. Keep pounding away and maybe find a secret backdoor to enter through. But what happens if pieces of the network are outside of the fortress? With the flurry of I.....»»

Source:  NetworkworldCategory: SecurityMay 25th, 2017Related News

Cisco to network engineers: Get comfortable with software. It’s here to stay

The shift to software-defined networks (SDN) was the catalyst to usher in a whole new way of running networks—and that’s through software. Some may argue that network engineers have been using software for decades, as every good router jockey.....»»

Source:  NetworkworldCategory: NetworkMay 25th, 2017Related News

IDG Contributor Network: Postcards from the network edge

I was recently invited to participate on a panel at a major IT conference, where questions from the audience provided an interesting window into the top issues that networking professionals are dealing with as part of their organizations’ digita.....»»

Source:  NetworkworldCategory: NetworkMay 25th, 2017Related News

IDG Contributor Network: Network analysis can find malware before it strikes

Network traffic analysis should be used more in the fight against malware. That’s because pointers show up on the network “weeks and even months” in advance of new malicious software being uncovered, scientists from the Georgia Institute of.....»»

Source:  NetworkworldCategory: NetworkMay 25th, 2017Related News

IDG Contributor Network: Machine learning: Are we there yet?

In my recent blogs, I have written about automation tying the network to other domains of IT, and how it’s a capability available today that you should start using.Machine learning is another hot topic. While the timeline is several years out fo.....»»

Source:  NetworkworldCategory: NetworkMay 24th, 2017Related News

EternalRocks network worm uses 7 NSA hacking tools

While you won’t be forgetting the WannaCry ransomware attack, it is likely you will be hearing a lot more about the alleged NSA-linked EternalBlue exploit and DoublePulsar backdoor, as it seems a wide range of bad guys have them in their toy box.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

New products of the week 5.22.17

Running its courseImage by UntangleNetwork World's long-running product of the week slideshow has come to an end with this edition. Vendors are still welcome to discuss their products with reporters. Thank you to all who have submitted products. Cyp.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

Splunk on SOAPA (part 1)

I’ve written a lot about ESG’s security operations and analytics platform architecture (SOAPA).  SOAPA is happening because enterprise organizations are surrounding SIEM with lots of other security analytics and operations tools to accelerate.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

Netgear NightHawk R7000 routers now collect user data

Netgear makes some popular routers, but do you really want the company behind your model of router to collect data such as your IP address and MAC address? If the answer is no, then you need to disable the "analytics" data collection.Netgear’s N.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

Hackers easily trick iris scanner to unlock Samsung Galaxy S8

When it comes to security and the iris recognition technology used in its flagship Galaxy S8 smartphone, Samsung touted, “The patterns in your irises are unique to you and are virtually impossible to replicate, meaning iris authentication is one.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

IDG Contributor Network: How quantum computing increases cybersecurity risks

Imagine you wake up one morning, assuming everything is as you left it the night before. But overnight, attackers with a quantum computer capable of breaking current cryptography standards have targeted millions of people and stolen their personal.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News

IDG Contributor Network: How security executives can feel comfortable in the boardroom and server room

With information security being a major concern at all companies, successful security executives need to be equally comfortable in the boardroom and the server room. While being well-versed in traditional security duties, like developing incident.....»»

Source:  NetworkworldCategory: SecurityMay 23rd, 2017Related News