|
White Paper: Palo Alto Networks Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims' machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. Read More ▶ |
Parental perks are aimed at attracting more diverse workforce Read More ▶ |
|
U.S. International Trade Commission Judge MaryJoan McNamara issued the so-called “initial determination” on the case which now must be reviewed by the ITC. In the end should the ITC find against Arista its switches could once again be banned from import into the US. The ITC you may recall ruled against Arista in another part of this case and between June and August the company could not import those products. In November Arista announced that US Customs has given it permission to resume importing its networking gear in the United States. Read More ▶ |
|
|
PowerShell is a valuable tool for automating Windows administration tasks, including laborious security chores Read More ▶ |
|
The number of ransomware attacks targeting companies increased threefold from January to September, affecting one in every five businesses worldwide. Read More ▶ |
|
If banks prioritize digital transformation and make this shift, the traditional banking model that we know today will look vastly different tomorrow. Read More ▶ |
|
Security and network trends for 2017 include the evolution of malware, IoT will contribute to security concerns, and AI and machine learning will be applied to security. Read More ▶ |
|
Pundits who got it wrong explain why ... or deny that they did Read More ▶ |
|
As more corporate data is stored in the cloud, security incidents are no longer isolated to PCs and applications on the network Read More ▶ |
|
Data from an ESG/ISSA report reveals the most important attributes for CISOs and why CISOs leave their jobs so often. Read More ▶ |
|
Video/Webcast: Keeper Security Passwords are the most basic form of protection, yet they are also the most susceptible to outside hacking because of poor employee practices. Whether employees write them down, simplify them, or neglect to change them, passwords are an easy target for outside hacking. This video discusses password best practices, and what an companies can do to manage their employees password. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS 20 years ago: Hot sci/tech images from 1996 Read More ▶ |
Most-Read Stories |