|
Video/Webcast: CDW | EMC We're in the midst of the third industrial revolution -- the era of digital business. Big data analytics and the Internet of Things are giving rise to new digital business strategies. In this webcast, you will learn how converged infrastructure, built on such technologies as virtualization and flash storage, is enabling businesses to successfully achieve digital transformation. Read More ▶ |
While the path to security architect varies, anyone considering the role should have a passion for IT infrastructure and protecting data. Read More ▶ |
|
Staples has hired its first chief information security officer (CISO), a key new member of the office supply giant's team that combines traditional IT and digital transformation. Read More ▶ |
|
|
Check Point is investing heavily in educating IT pros about the cloud, not only to promote their own cloud security products but to give potential customers the skills they’ll need to keep their jobs as their employers move more and more resources to public cloud providers. Read More ▶ |
|
Cisco this week said it patched a critical vulnerability in its widely deployed IOS software that was disclosed in the WikiLeaks dump of CIA exploits earlier this year. Read More ▶ |
|
Simply labeling a password weak or strong doesn’t work. Password meters must tell people what’s wrong with their password and suggest fixes. AI can do that. Read More ▶ |
|
Bot-herding software called Persirai, which incorporates pieces of the Mirai botnet code, can commandeer significant chunks of a known 150,000 IP cameras that are vulnerable to Mirai and use them to fire off distributed denial-of-service attacks. Read More ▶ |
|
Security company Modzero found a program acting as a keylogger in certain HP PCs. Read More ▶ |
|
Enterprise-class cybersecurity technology vendors must offer SIEM software, security analytics, and operations capabilities or have strong SIEM partners. Read More ▶ |
|
Users of Asus RT-N and RT-AC series routers should install the latest firmware updates released for their models because they address vulnerabilities that could allow attackers to hijack router settings. Read More ▶ |
|
White Paper: Symantec The market is flooded with endpoint security technologies, incident response tools, threat intelligence feeds, and behavioral analytics. Know what the key requirements are before shopping for modern endpoint threat detection, prevention and/or response, and remediation solutions. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS Cool ways to celebrate Star Wars Day Read More ▶ |
Most-Read Stories |