|
White Paper: CrowdStrike Learn how the Cloud makes it possible to regain unprecedented control over endpoints while detecting, preventing, and responding to attacks in a way that far surpasses on-premise architectures. Read More ▶ |
History-making events from Cisco, IBM and Nortel to Facebook, Google and Apple. Read More ▶ |
|
According to the FBI, the new cybercriminals Amad Umar Agha 22, known online as “The Pro,” and Firas Dardar, 27, known online as “The Shadow,” engaged in a multi-year conspiracy that began in 2011 to collect usernames and passwords that gave them the ability to deface websites, redirect domains to sites controlled by the conspirators, steal e-mail, and hijack social media accounts. Read More ▶ |
|
Verizon Enterprise, a bulwark against cyberattacks at many large organizations, has suffered a security breach itself. Read More ▶ |
|
|
The new Petya ransomware overwrites the master boot record (MBR) of the affected PCs, leaving the OS in an unbootable state, researchers from antivirus firm Trend Micro said. Read More ▶ |
|
The IRS faces an uphill battle in combatting identity theft, but that doesn’t mean it isn’t trying. In fiscal year 2015, the IRS said it started 776 identity theft related investigations, which resulted in 774 sentencings through its Criminal Investigation enforcement efforts. The courts continue to impose significant jail time with the average penalty in 2015 at 38 months in jail— the longest sentencing being over 27 years. Read More ▶ |
|
NASA this week said it was considering a new Centennial Challenge: Build and airship capable of long duration flight for scientific missions. The agency issued a Request For information to see if there was enough industry interest in the challenge and to further develop rules for the competition. You may recall that NASA’s Centennial Challenges Program sets up challenging contests for the public, academia, and industry with an eye towards developing innovative technologies. Read More ▶ |
|
At its big cloud user conference this week Google added some core features for enterprise customers and some fancy new machine learning tools too. Check out the top 10 announcements from Google Cloud Platform NEXT. Read More ▶ |
|
"The entire C-suite and board is on the hot seat for security these days," says Matthew Karlyn. And that makes data breaches everyone's business. Read More ▶ |
|
Social engineering and ‘download this attachment’ scams are back – as if they ever left – and working better than ever, unfortunately. Read More ▶ |
|
White Paper: CompTIA It's the worst case scenario. You've just been notified that your company has experienced a data breach. How did this happen? It's a question that a growing list of CIOs have grappled with recently. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS How to respond to ransomware threats Read More ▶ |
Most-Read Stories |