TSA: Keep grandma’s gravy at home but the turducken can fly

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Nov 18, 2016
Featured Image

Cisco sales tick up, CEO Robbins bullish on data center, security, collaboration

Cisco announced Wednesday that it eked out 1% revenue growth in its fiscal first quarter, compared to the same quarter last year, in what CEO Chuck Robbins described as a “challenging global business environment.” Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

TSA: Keep grandma’s gravy at home but the turducken can fly
Congress members try to grasp enormity of IoT DDoS attacks
IBM sets up test range to practice fighting nightmare cyber battles safely
Report: Surveillance cameras most dangerous IoT devices in enterprise
7 cybersecurity best practices that regulated industries deal with
IoT gear will need better security to win a Z-Wave badge
Trump remains frighteningly behind in cybersecurity

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

TSA: Keep grandma’s gravy at home but the turducken can fly

>From the TSA: “Gravy is sadly prohibited from carry-on bags unless you pack it in accordance with our liquid polices mentioned above. You can also pack it in your checked baggage.” Read More

Thumbnail Image

Congress members try to grasp enormity of IoT DDoS attacks

Dale Drew, CSO of Level 3 Communications, crypto guru Bruce Schneier, and Dr. Kevin Fu explained how IoT-based botnets are being used in DDoS attacks. Read More

Thumbnail Image

IBM sets up test range to practice fighting nightmare cyber battles safely

IBM Security has launched a network-emulation environment where corporate teams can play out attack scenarios so they are better prepared for incidents they might face in the real world. Read More

Thumbnail Image

Report: Surveillance cameras most dangerous IoT devices in enterprise

Networked security cameras are the most likely to have vulnerabilities when it comes to securing Internet of Things devices in the enterprise, according to a new report. Read More

Thumbnail Image

7 cybersecurity best practices that regulated industries deal with

Whether you work for an organization controlled by compliance standards or you are an independent IT firm looking to build your enterprise business, understanding industry regulations is crucial as it pertains to cybersecurity. Michael Hall, CISO, DriveSavers, provides a few best practices for businesses operating in or with regulated industries. Read More

Thumbnail Image

IoT gear will need better security to win a Z-Wave badge

Tighter security will soon be mandatory for IoT devices that use the popular Z-Wave wireless protocol. Starting next April, the Z-Wave Alliance will require all products to include its S2 (Security 2) framework before they can be certified as Z-Wave compliant. Read More

Trump remains frighteningly behind in cybersecurity

Limited vision statement, lack of knowledge and bureaucratic intransigence could increase cyber risk after Trump is inaugurated. Read More

Video/Webcast: Veracode

The Cyber Security at Your Company is at Risk

We've seen a dramatic rise in attacks on the application layer. Often left unguarded, this layer has become a prime gateway for attacks. Avoid the brand and financial damage these attacks cause. Protect your company's brand - watch this video highlighting why application security matters! Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Six big projects that went open-source

6 machine learning misunderstandings Read More

Most-Read Stories

1. Best Apple Watch deals for Black Friday 2016
2. Best Android Black Friday 2016 deals on tablets, phones and more
3. Best Black Friday 2016 deals on Apple iPhones, iPads, watches and more
4. Cybersecurity fabric vs. a security platform: Fabric wins
5. Welcome to the 11th Gibbs Golden Turkey Awards
6. Gartner predicts: SD-WANs to replace routers, but which SD-WAN is the question
7. Hottest Black Friday 2016 Windows PC, tablet and game deals
8. 7 free tools every network needs
9. 19 free cloud storage options
10. Super Mari-owned: Startling Nintendo-based vulnerability discovered in Ubuntu
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as [email protected].

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to [email protected].