|
Solution Center: Rapid7 When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More ▶ |
Some companies responded after the WikiLeaks dump suggested that the CIA targets their products, while others remain silent. Read More ▶ |
|
Juniper is reshaping some of its top executive roles as Jonathan Davidson, executive VP and general manager of the firm’s Development and Innovation group resigned from the company. Davidson, a former Cisco executive in charge products such as the Cisco 7200 and Enterprise ASR 1000 product management team joined Juniper in 2010 to lead the company’s Security, Switching and Solutions Business Unit. Read More ▶ |
|
|
Beyond blocking spam and virus-laden messages, cloud services can determine whether links are safe to visit and whether you’re protecting the right information. Read More ▶ |
|
Consumer Reports helped develop The Digital Standard for rating digital privacy and cybersecurity of IoT devices, and it will use it in upcoming product reviews. Read More ▶ |
|
FBI director James Comey told a cybersecurity conference that “absolute privacy” has never been part of the nation’s privacy-security bargain. Ubiquitous strong encryption, he said, “shatters that bargain.” Read More ▶ |
|
Thanks to WikiLeaks, antivirus vendors will soon be able to figure out if you have been hacked by the CIA. Read More ▶ |
|
Does attack attribution and knowing your adversaries really matter when it comes to securing the enterprise? Read More ▶ |
|
|
Extreme’s Ed Meyercord, President and CEO said he expects the deal will broaden the company’s software and strengthen its presence in vertical markets such as healthcare and manufacturing. Norman Rice, an executive vice president with Extreme added that some of Avaya’s strengths included its networking fabric and Network Micro-Segmentation technology that helps customers secure enterprise components. Read More ▶ |
|
Video/Webcast: IBM Corporation Security teams looking to extend their network perimeter defenses with an attack and breach detection capability are discovering that a hosted SIEM gets them up and running faster. Join us Monday, March 27, 2017, 01:00 PM EDT, to hear 5 real-world use cases and how to request a free trial of QRadar on Cloud. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS Coolest new Android phones at Mobile World Congress 2017 Read More ▶ |
Most-Read Stories |