Advertisements


Iraq Wants, But Can’t Get, US Drone Zapper

How badly do Iraqi security forces want a new U.S.-made frequency-jamming gun to target ISIS drones? Check out this CBS News video to see for... How badly do Iraqi security forces want a new U.S.-made frequency-jamming gun to target ISIS drones?.....»»

Source:  DefensetechCategory: Security6 hr. 51 min. ago Related News

Iraqi hacker took credit for hijacking subdomain and defacing Trump site

A hacker, purportedly from Iraq, defaced a site previously used by President Donald Trump for campaign fundraising. The “hack” occurred Sunday on the server, secure2.donaldjtrump.com. It was short-lived.A screenshot of the defacement was poste.....»»

Source:  NetworkworldCategory: SecurityFeb 20th, 2017Related News

12 steps to small business security

Swimming upstream?Image by ThinkstockIf you’re a small to midsized business and you wing it when it comes to network management and security then it’s not a question of if you will have a disaster, it’s merely a question of when. Why? Because m.....»»

Source:  NetworkworldCategory: SecurityFeb 20th, 2017Related News

New products of the week 2.20.17

New products of the weekImage by RiverbedOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Ambra for DevelopersImage by ambraTo read this article in full or to leave a comment, pleas.....»»

Source:  NetworkworldCategory: SecurityFeb 20th, 2017Related News

F-bombing cop recorded threatening to sic dog on driver to rip him up

Getting pulled over by the cops can be stressful, especially if one of the cops is shouting, cursing and threatening to sic a 90-pound dog on a motorist to rip the *bleep* out of him. The Atlantic City cop was dropping f-bombs all over the place,.....»»

Source:  NetworkworldCategory: SecurityFeb 19th, 2017Related News

Why cyber-robotics is key to cybersecurity"s future

Chad Holmes, Principal of Ernst & Young LLP sits down with Network World's Neal Weinberg to talk about how cyber-robotics will help shape the future of cybersecurity......»»

Source:  NetworkworldCategory: SecurityFeb 18th, 2017Related News

RSA demo: TruStar anonymizes incident data to improve information exchange

TruStar's head of product, Shimon Modi, shows CSO Online's Steve Ragan how his company is changing the game when it comes to incident reporting for companies......»»

Source:  NetworkworldCategory: SecurityFeb 18th, 2017Related News

Ride along to solve these data breaches

Riding alongImage by Daimler AGVerizon’s recently released annual breach report that examines some of its cases where the RISK Team was called in to hunt down culprits. The “ride –along edition” of Verizon’s report gets a first-person persp.....»»

Source:  NetworkworldCategory: SecurityFeb 18th, 2017Related News

Ride along to solve these data breaches

Riding alongImage by Daimler AGVerizon’s recently released annual breach report that examines some of its cases where the RISK Team was called in to hunt down culprits. The “ride –along edition” of Verizon’s report gets a first-person persp.....»»

Source:  NetworkworldCategory: SecurityFeb 18th, 2017Related News

Users take the cheese to solve data breaches

Cheese Movers International’s restructuring resulted in some employees being unhappy with either their new role or the new management. And unhappy employees, especially those who know the system well and have access, can become major problems fo.....»»

Source:  NetworkworldCategory: SecurityFeb 18th, 2017Related News

Executive to Military: Be Like SOCOM and Bet on the Little Guy

To James “Hondo” Geurts, the top weapons buyer for U.S. Special Operations Command, taking risks on fledgling defense companies is sometimes the only way to... To James “Hondo” Geurts, the top weapons buyer for U.S. Specia.....»»

Source:  DefensetechCategory: SecurityFeb 17th, 2017Related News

IRS Dirty Dozen: Phishing, phone cons and identity theft lead scam list for 2017

The Internal Revenue Service rounded up some of the usual suspects in its annual look at the Dirty Dozen scams you need to watch out for this year. It should come as no surprise that the IRS saw a big spike in phishing and malware incidents durin.....»»

Source:  NetworkworldCategory: SecurityFeb 17th, 2017Related News

CyberTech conference showcases cybersecurity solutions originating in Israel  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Mention “cybersecurity conference” and most people think of the annual RSA Conference, which was held last week. But halfway around the worl.....»»

Source:  NetworkworldCategory: SecurityFeb 17th, 2017Related News

CyberTech conference showcases cybersecurity solutions originating in Israel  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Mention “cybersecurity conference” and most people think of the annual RSA Conference, which was held last week. But halfway around the worl.....»»

Source:  NetworkworldCategory: SecurityFeb 17th, 2017Related News

RSA: Eric Schmidt shares deep learning on AI

SAN FRANCISCO – Alphabet chairman Eric Schmidt says artificial intelligence is key to advances in diverse areas such as healthcare and datacenter design and that security concerns related to it are somewhat misguided. (Alphabet is the parent com.....»»

Source:  NetworkworldCategory: SecurityFeb 17th, 2017Related News

RSA: Eric Schmidt shares deep learning on AI

SAN FRANCISCO – Alphabet chairman Eric Schmidt says artificial intelligence is key to advances in diverse areas such as healthcare and datacenter design and that security concerns related to it are somewhat misguided. (Alphabet is the parent com.....»»

Source:  NetworkworldCategory: SecurityFeb 17th, 2017Related News

Experts at RSA give their best cybersecurity advice

Come to the RSA show, and you’ll find plenty of cybersecurity technology. The top vendors from across the industry are here, showing products for fighting ransomware, preventing data breaches and more.But even the best security software is usele.....»»

Source:  NetworkworldCategory: SecurityFeb 16th, 2017Related News

First F-35A Fighters to Deploy to Pacific, General Says

The first F-35A Joint Strike Fighter jets will deploy to the Pacific this year, according to a top Air Force general. “Our first operational squadron... The first F-35A Joint Strike Fighter jets will deploy to the Pacific this year, accordi.....»»

Source:  DefensetechCategory: SecurityFeb 16th, 2017Related News

Why (or where) many security programs fail

At RSA 2017, CSO’s Steve Ragan chats with security expert Ira Winkler about where many security programs are failing within companies, as well as his concept of “advanced persistent security.”.....»»

Source:  NetworkworldCategory: SecurityFeb 16th, 2017Related News

The Challenges of Identity in the Cloud

JD Sherry, VP of Cloud Security at Optiv talks to Infoworld's Fahmida Rashid about the challenges of identity in cloud environments......»»

Source:  NetworkworldCategory: SecurityFeb 16th, 2017Related News