|
eBook: Sqrrl Cyber threat hunting is the proactive, iterative search for advanced cyber threats that have evaded your other defenses. In this ebook you will learn about threat hunting benefits, frameworks, and best practices. Read More ▶ |
Here’s how to find out if your child is involved in malicious online activity -- before the authorities do Read More ▶ |
|
David Richardson, director of product at Lookout, walks us through this all-too-common attack. Read More ▶ |
|
Attackers can exploit vulnerabilities in Android devices with Qualcomm chipsets in order to extract the encrypted keys that protect users' data and run brute-force attacks against them. Read More ▶ |
|
|
A second man has pleaded guilty to using a phishing scheme to get access to private and sensitive videos and photographs of people in the entertainment industry in Los Angeles. Read More ▶ |
|
The number of state wiretaps in which encryption was encountered decreased from 22 in 2014 to 7 in 2015. In all of these wiretaps, officials were unable to decipher the plain text of the messages. Six federal wiretaps were reported as being encrypted in 2015, of which four could not be decrypted. Encryption was also reported for one federal wiretap that was conducted during a previous year, but reported to the AO for the first time in 2015. Officials were not able to decipher the plain text of the communications in that intercept. Read More ▶ |
|
Attackers are developing an aggressive new ransomware program that encrypts both user files and the computer's master boot record (MBR), leaving affected machines unable to boot into the OS. Read More ▶ |
|
The days of simple endpoint protection based on traditional anti-malware tools are over. There are now advanced endpoint detection and response (EDR) tools that go beyond proactive monitoring and endpoint protection. Here are capsule reviews of 10 advanced endpoint protection products: Read More ▶ |
|
Huge amounts of video imagery being captured increases the likelihood of sensitive data being inadvertently distributed. Computer scientists say they have a solution. Read More ▶ |
|
An IDG Enterprise study of big-data initiatives finds that the extremely valuable output of those projects often lacks additional security. Download the free report. Read More ▶ |
|
White Paper: Sqrrl Threat Hunting Platforms are new critical tool for Security Operations Centers. This whitepaper describes what a Threat Hunting Platform is and how it complements your existing SIEM deployment. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS 20 highest paid tech CEOs Read More ▶ |
Most-Read Stories |