|
White Paper: CDW Corporation Trend Micro provides enterprise IT teams with a wide range of solutions that are specifically developed to enhance the security of Microsoft platforms and products. Trend Micro's products range from traditional anti-malware solutions to cloud-centric intrusion detection and prevention packages. IT professionals adopting Trend Micro solutions benefit from the company's long-standing partnership with Microsoft. Read More ▶ |
If you plan on hiring new grads this summer, you'll want to make sure you get them up to speed on the importance of corporate security as soon as possible -- because they aren’t as savvy as they think. Read More ▶ |
|
Stay on top of account management and assess staff cybersecurity skills with CIS Controls 16 and 17. Read More ▶ |
|
The impact of a breach can be lessened if an organization is well prepared to respond quickly. The head of Experian's Data Breach Resolution group advises how Read More ▶ |
|
|
With the growth of Internet-connected 3D printers, researchers say there's a threat of hackers tweaking manufacturing specifications and introducing defects that affect the reliability of parts for numerous industries. Read More ▶ |
|
The creators of the widespread Locky ransomware have added a fallback mechanism in the latest version of their program for situations where the malware can't reach their command-and-control servers. Read More ▶ |
|
For a limited time, the bundle of courses is only $29.99 and jam-packed with over 48 hours of courses and 50 hours of advanced training. Read More ▶ |
|
Since the Pokemon Go game launched last week, a throng of unofficial apps have tried to piggyback on the title’s success. And many of them are hungry for users’ private information. Read More ▶ |
|
In this episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks with Brett Hansen, executive director of Data Security Solutions at Dell, about keeping data safe in an increasingly mobile world. Watch Now ▶ |
|
Juniper Networks has fixed several vulnerabilities in the Junos operating system that's used on its networking and security appliances, including a flaw that could allow hackers to gain administrative access to affected devices. Read More ▶ |
|
White Paper: Endgame Systems Medicine is helpful only if you understand what is wrong with the person and provide the proper remedy. The wrong medicine does no good and, in some cases, can make things worse. In a similar vein, many organizations spend lots of money on security but fail to apply remedies that make it harder for adversaries and control the damage caused by attacks. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS 10 advanced endpoint protection tools Read More ▶ |
Most-Read Stories |