Network World Security Alert |
| |
|
In a move that could lead to a ban on selling its products in the United States, the US International Trade Commission has ruled that Arista does in fact infringe on a number of Cisco’s technology patents. Arista now must decide if it wants to ask the US government to overturn the so-called “import ban” or ask that an appeals court toss the decision, observers say. It could also decide to build products in the US – a move that Cisco says would “not only would violate the ITC orders, but the federal court has the authority to enjoin local manufacturing of infringing products.” Read More ▶ |
|
| White Paper: RES Software As organizations strategize to best support their dynamic workforce, there are some important technologies trends that IT should have on their radar so projects don't sneak up on them. Learn how IT can prepare for Windows 10, Office 365 and more. Read More ▶ | Contrary to what you might think, updating code a lot can cut security issues in half -- and improve software quality Read More ▶ |
| The key IRS advisory group, The Electronic Tax Administration Advisory Committee issued its annual state of the agency report this week that concluded: The erosion of the IRS tax system’s integrity from the proliferation of tax identity theft and inadequate levels of taxpayer service at the IRS caused by an antiquated customer service model that does not adequately apply digital service tools. Read More ▶ |
| According to IBM and XPrize, the four-year competition aims to “accelerate adoption of AI technologies, and spark creative, innovative and audacious demonstrations of the technology that are truly scalable and solve societal grand challenges. Read More ▶ |
| | Finally, a way around the problem of administrator passwords that are identical across machines, just waiting to be scooped up in pass-the-hash-attacks. Read More ▶ |
| Microsoft has significantly upped the tally of U.S. government gag orders slapped on demands for customer information. Read More ▶ |
| The prevalence of ransomware programs, both those that encrypt data and those that don't, has exploded over the past two years, with companies being increasingly targeted. Read More ▶ |
| Gartner has taken a look at five key areas of security concern that businesses face this year and issued predictions on and recommendations about protecting networks and data from threats that will likely arise in each. Read More ▶ |
| Yet another leak, this time it was a database containing the records of 154 million U.S. voters; accessing it required no password or any authentication. Read More ▶ |
| Three vendors, including Microsoft and Amazon Web Services, have won a key U.S. government authorization that will allow federal agencies to put highly sensitive data on the cloud-computing services. Read More ▶ |
| White Paper: Aruba, an HP Enterprise Company Mobile and IoT devices such as laptops, smartphones, and smart watches can now be found in most businesses, as users demand access to the corporate network from anywhere, anytime. Securing for BYOD is a conversation IT needs to have, but it doesn't have to be a painful one. Employ these 8 best practices to boost your network security and end those headaches for good. Read More ▶ |
|
|
|