|
White Paper: Leidos A comprehensive look at the top four challenges facing your security operations is the first step to mitigating them. Why not approach them as opportunities to strengthen your cybersecurity posture and better protect your assets! This white paper discusses the universal challenges facing every SOC: Resource allocation, Threat alert management, Vendor dependencies, Intelligence standardization Read More ▶ |
The Association for Computing Machinery (ACM) has announced it will celebrate 50 years of the A.M. Turing Award -- dubbed the "Nobel Prize of Computing -- with a (tech) star-studded conference in San Francisco this summer. Read More ▶ |
|
Valentine's Day gifts offer a techie alternative to the usual flowers, jewelry and candy. Read More ▶ |
|
|
RSA Conference 2017 will take on the threat posed by the internet of things, something that was demonstrated last fall by the DDoS attacks that took down Dyn data centers and many of the high-profile Websites it supports. Read More ▶ |
|
You won’t find many public references by Apple to its Mobility Partner Program, an expanding effort by the company to unite with software developers/integrators to boost sales of iPhones and iPads to businesses. But the veil of secrecy surrounding the program is thinning. Read More ▶ |
|
The biggest downside of Wi-Fi for most users might be that it can really drain your smartphone or tablet battery, but a research team at the University of Washington has come up with a way to make using the nearly ubiquitous wireless technology in a less taxing way. Read More ▶ |
|
The Internet Hall of Fame, a virtual museum celebrating the living history of the Internet, is back seeking a new class of inductees in 2017 after going quiet for the past couple of years. Read More ▶ |
|
William (Bill) Yeager, 66, creator of the multiprotocol router, reflects on the development of the device that fueled the growth of networking. Read More ▶ |
|
Network-based encryption such as SSL and IPsec can help guard against security threats to IoT gateways and devices. For this writer, IPsec is the better option. Read More ▶ |
|
Apple credited iPhone 7 sales for its strong Q1 results, but it's time to look ahead toward the iPhone 8. Read More ▶ |
|
White Paper: Leidos A comprehensive look into how organizations can develop and implement a successful insider threat detection program. This white paper outlines the five steps to success: Gain Leadership Support, Leverage the Latest Technology, Develop a Communications Plan, Execute a Training and Awareness Campaign, Establish a Governance Structure Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS 7 (more) security TED Talks you can’t miss Read More ▶ |
Most-Read Stories |