What’s hot at the monster CeBit show?

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 17, 2016
Featured Image

Cyberespionage groups are stealing digital certificates to sign malware

An increasing number of cyberespionage groups are using stolen code-signing certificates to make their hacking tools and malware look like legitimate applications. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What’s hot at the monster CeBit show?
How to get started in IT security consulting
Digital rights group: Save security, reject FBI's iPhone unlocking request
Air Force faces challenges managing drone force
Steam Stealer malware provides a thriving business for cyber thugs
BYOD isn’t going away, so set a real strategy
Attackers exploit Apple DRM weakness to infect non-jailbroken iOS devices

White Paper: Lockheed Martin Industrial Defender Inc

4 Challenges Facing Every SOC Manager

A comprehensive look at the top four challenges facing your security operations is the first step to mitigating them. Why not approach them as opportunities to strengthen your cybersecurity posture and better protect your assets! Read More

Thumbnail Image

What’s hot at the monster CeBit show?

Read More

Thumbnail Image
INSIDER

How to get started in IT security consulting

IT security consulting is an excellent way to grow as a security professional. In contrast to an corporate role, consultants are exposed to a variety of business situations and industries. Those who succeed in the consulting world find themselves equipped with greater skills and cutting edge knowledge of new technologies. Read More

Thumbnail Image

Digital rights group: Save security, reject FBI's iPhone unlocking request

Digital rights group Fight for the Future is hoping to give voice to ordinary people concerned with the U.S. FBI's attempt to force Apple to help it unlock the iPhone used by a mass shooter. Read More

Thumbnail Image

Air Force faces challenges managing drone force

As unmanned aircraft become a larger part of the Air Force a number of challenges have surfaced that could impact drone squadron efficiency. A Government Accountability Office report out this week stated that while the Air Force has made efforts to manage its unmanned aircraft pilots but has not fully addressed issues related to: “identifying personnel requirements, recruiting and retention difficulties, the potential use of Department of Defense civilians as pilots, pilots completing their required training and moving pilots through the training pipeline.” Read More

Thumbnail Image

Steam Stealer malware provides a thriving business for cyber thugs

Over 125 million active Steam users should take heed of new report which looks at the booming business of Steam Stealer malware. Read More

Thumbnail Image
INSIDER

BYOD isn’t going away, so set a real strategy

Users are going to use their devices for work, no matter what you do. That’s why you need a policy that manages the considerable risks. (Insider; registration required) Read More

Thumbnail Image

Attackers exploit Apple DRM weakness to infect non-jailbroken iOS devices

Attackers are exploiting a weakness in Apple's digital rights management technology to install malicious apps on non-jailbroken iOS devices. Read More

Video/Webcast: Lockheed Martin Industrial Defender Inc

Advanced ICS Cybersecurity: Moving Beyond Defense in-Depth to an Intelligence-Driven Approach

Click here to listen to SANS ICS experts Michael Assante, and Robert M. Lee, along with Lockheed Martin Director of Commercial Cyber Solutions, Richard Mahler share Insight into APTs targeting ICS and critical infrastructure. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

11 highest paying tech jobs in America

7 VPN services for hotspot protection Read More

Most-Read Stories

1. IT workers dispute Disney rehiring claims
2. 40 virtual reality predictions
3. 19 free cloud storage options
4. Microsoft continues Linux lovefest with open source network software SONiC
5. Pushing cloud Wi-Fi way beyond basic connectivity
6. How far have we come with HTTPS? Google turns on the spotlight
7. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
8. 7 free tools every network needs
9. Review: Consider VPN services for hotspot protection
10. Microsoft renews its pushy Windows 10 activities
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.