Advertisements


The complexity of password complexity

Deploying password quality checking on your Debian-base Linux servers can help to ensure that your users assign reasonable passwords on their accounts, but the settings themselves can be a bit misleading. For example, setting a minimum password le.....»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

Unix: How random is random?

On Unix systems, random numbers are generated in a number of ways and random data can serve many purposes. From simple commands to fairly complex processes, the question “How random is random?” is worth asking.EZ random numbers If all you need.....»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

IDG Contributor Network: The fight to defend the Internet of Things

The Internet has entered a new chapter called the Internet of Things (IoT). It follows the fixed-Internet era characterized by connected PCs and laptops through the 1990s, and builds on the mobile-Internet era spearheaded by the proliferation of s.....»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

Choosing Windows for your organization should get you fired

In the wake of yet another ransomware attack—this time named NotPetya—I have a special message specifically for those of you working in organizations that continue to run Microsoft Windows as the operating system on either your servers or your.....»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

IDG Contributor Network: Fraud and the Internet of Things

During the past few years, the Internet of Things (IoT) has become one of the hottest movements of our time. Although many technology trends and buzzwords come and go overnight, it’s clear that the IoT is here to stay. Almost half of the world's.....»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

The 15 worst data security breaches of the 21st century

Some of the largest companies in the U.S. have been targets of hackers, including Yahoo, JP Morgan Chase and TJX. Watch as we detail the top 15 breaches and their overall impact on customers or employees......»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

Mingis on Tech: How linguistics can help catch cyberattackers

When it comes to tracking down the bad actors behind malware and ransomware, cybersecurity firms are turning to linguists......»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

Cisco continues its network-based security strategy by moving to acquire Observable Networks

Over the past few years Cisco has changed the face of its security business. What was once a struggling concern is now the fastest-growing part of Cisco. How did the company do this? Part of the rebirth of Cisco security can be traced to a change.....»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

What is IoT?

The Internet of Things, at its simplest level, is smart devices - from refrigerators that warn you when you’re out of milk to industrial sensors – that are connected to the Internet so they can share data, but IoT is far from a simple challeng.....»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

IBM wants you to encrypt everything with its new mainframe

IBM wants businesses to use its new z14 mainframe to encrypt pretty much everything -- an approach to security it calls pervasive encryption.Encrypting everything, and restricting access to the keys, is one way to reduce the risk and impact of dat.....»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

IBM touts full data encryption in new Z series mainframes

IBM has introduced the 14th generation of its Z series mainframes, which still sell respectably despite repeated predictions of their demise. One of the major features being touted is the simple ability to encrypt all of the data on the mainframe.....»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

Unix: How random is random?

On Unix systems, random numbers are generated in a number of ways and random data can serve many purposes. From simple commands to fairly complex processes, the question “How random is random?” is worth asking.EZ random numbers If all you need.....»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

Tech Talk: The latest on Azure Stack, cyberattacks, the next iPhone and ... keyboards

Get the details on Microsoft's new Azure Stack, why cyberattacks never seem to end, the fate of Apple's Touch ID and why QWERTY keyboards are now tech relics......»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

Stop blaming users for security misses

Does the message to users about security need to change? Or does IT need to rebuild infrastructure so users can worry less about security? Wendy Nather, principal security strategist at Duo Security, talks with CSO senior writer Fahmida Rashid about.....»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

How DevOps and cloud will speed up security

Zane Lackey, CSO and co-founder of Signal Sciences, talks with CSO senior writer Fahmida Rashid about how DevOps and cloud can help organizations embed security into their technology structures, enabling business to move faster......»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

IDG Contributor Network: Can SD-WANs meet standards requirements?

Any innovative technology faces a battle of doubt. When Amazon first rolled out AWS, few could imagine servers running in the cloud. Before Salesforce, many thought CRM to be too critical to run as SaaS. I find SD-WANs to be facing a similar battl.....»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

Bringing behavioral game theory to security defenses

Kelly Shortridge and CSO senior writer Fahmida Y Rashid talk about using behavioral game theory to take advantage of hackers’ mistakes and manipulate the data they think they're receiving. People generally make decisions by either thinking ahead to.....»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

Safeguarding power grids and other critical infrastructure from data leaks

CSO senior writer Steve Ragan talks with cybersecurity experts Krypt3ia and Kodor about how the pair seek out passwords, schematics and other sensitive documents on SCADA control system architectures that shouldn't be available online, passing along.....»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

True random numbers are here — what that means for data centers

For many decades, the term “random numbers” meant “pseudo-random numbers” to anyone who thought much about the issue and understood that computers simply were not equipped to produce anything that was truly random.Manufacturers did what th.....»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News

Do developers care about security?

They certainly do, according to Sarah Gibson, application security consultant at Veracode, who talks with CSO senior writer Fahmida Rashid about the issues around application security, and how having a collaborative security team is key to writing go.....»»

Source:  NetworkworldCategory: SecurityAug 7th, 2017Related News