|
Solution Center: Rapid7 When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More ▶ |
Crooks are stealing code from the purveyors of Petya ransomware and using it to extort money from innocent victims, stiffing the creators of the malware out of the cut they are supposed to get. Read More ▶ |
|
Microsoft today postponed the retirement of the security bulletins it uses to describe in detail each month's slate of vulnerabilities and patches. Read More ▶ |
|
|
Apple claims most of the CIA iPhone exploits referenced by the WikiLeaks data dump have been patched. Read More ▶ |
|
With the rampant availability of IoT devices, cybercriminals offer denial of service attacks to take advantage of password problems. Read More ▶ |
|
Highly personal identifying information for nearly 34 million Americans has been leaked online thanks to a NetProspex breach. Read More ▶ |
|
A vulnerability patched in the web-based versions of encrypted communications services WhatsApp and Telegram would have allowed attackers to take over accounts by sending users malicious files masquerading as images or videos. Read More ▶ |
|
The U.S. Federal Bureau of Investigation has charged four people, including two Russian state intelligence agents, for their involvement in a massive hack of Yahoo that affected half a billion accounts. Read More ▶ |
|
The Defense Advanced Research Projects Agency (DARPA) continues to hone the system it hopes would quickly restore power to the U.S. electric grid in the event of a massive cyberattack. The research agency this week said it awarded defense system stalwart BAE Systems an $8.6 million contract to develop a system under its Rapid Attack Detection, Isolation and Characterization (RADICS) program that has as its central goal to develop technology that will detect and automatically respond to cyber-attacks on US critical infrastructure. Read More ▶ |
|
Video/Webcast: RES Software A company's biggest assets are its people! But the people can't be productive if they don't have access to the apps, information and data needed to make decisions. Learn how you can ensure that all IT assets are protected and users have easy access to the apps and services they need to be productive. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS 6 cloud computing savings you may be missing out on Read More ▶ |
Most-Read Stories |