|
White Paper: Lookout Mobile Security As threats to enterprise mobility continue to intensify, the mobile security industry is evolving quickly. In this report, Lookout co-founders John Hering and Kevin Mahaffey share their predictions for what important new changes are coming and how you can best prepare your organization for success. Read More ▶ |
This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his sights are set now. Read More ▶ |
|
IBM says cybercriminals are starting to grab unstructured data, spam has rebloomed 400% and ransomware has just gone nuts Read More ▶ |
|
|
Yes, you can save quite a bit of money taking an Uber instead of a cab in most cases, but not if you leave your smartphone, purse, guitar or engagement ring behind. Uber Lost & Found Index revealed. Read More ▶ |
|
Products based on the IEEE 802.11ad (WiGig) standard have really only begun rolling out over the past year, but an effort to deliver an enhancement dubbed 802.11ay in the unlicensed 60 GHz spectrum band that promises to deliver faster and longer range W-Fi networks is gaining steam. Read More ▶ |
|
While not as useless as PR pitches about technology companies cracking some other publication's Top 10 list, "independent" research reports commissioned by vendors are right up there. Read More ▶ |
|
VMware has released critical security patches for vulnerabilities demonstrated during the recent Pwn2Own hacking contest that could be exploited to escape from the isolation of virtual machines. Read More ▶ |
|
The W-2 scam provides another example of how a security awareness program that adapts to trending threats has an advantage over a one-size-fits-all plan. Read More ▶ |
|
Developers who publish their code on GitHub have been targeted in an attack campaign that uses a little known but potent cyberespionage malware. Read More ▶ |
|
Carnegie Mellon University this week launches its third annual online capture the flag (CTF) contest aimed at introducing middle and high school students to the world of IT security — and just maybe attract some of them into a segment of the job market hungry for talent. Read More ▶ |
|
White Paper: Couchbase How do the latest releases of two leading NoSQL databases compare on both read/write and query performance? The emerging technologies thought leader Avalon Consulting, LLC benchmarked MongoDB 3.2 and Couchbase Server 4.5 to find out. These big data experts ran industry standard (YCSB) workloads for both read/write and query. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS How to stop insider threats Read More ▶ |
Most-Read Stories |