Third parties leave your network open to attacks
Most businesses hire third-party providers to fill in when they lack in-house resources. It is often necessary to allow third-party vendors access to their network. But after Target’s network was...
View ArticleNew products of the week 5.8.17
New products of the weekImage by Aspect SoftwareOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Browser Stored Password Discovery...
View ArticleComputer forensics follows the bread crumbs left by perpetrators
The boss gets tipped off that an employee might be leaving the company and in so doing is trying to grab as many clients as possible to take with him to his new job. The company brings in computer...
View Article6 things you need to know about IoT security
Security, trust and data integrityImage by ThinkstockThe emergence of IoT is altering our personal technology security paradigm and is a game-changer in customer/business interaction, in part due to...
View ArticleVendors approve of NIST password draft
A recently released draft of the National Institute of Standards and Technology’s (NIST's) digital identity guidelines has met with approval by vendors. The draft guidelines revise password security...
View ArticleTop DRaaS companies to watch
Forrester Research recently released its report naming Sungard AS, Bluelock, IBM and iland as the top disaster recovery-as-a-service companies.With enterprises expecting their network up at all times,...
View ArticleQ&A Citrix CSO: How to deal with security across multiple generations of...
Citrix’s CSO Stan Black has been in the cybersecurity field for 20 years. He has seen generations of employees come and go at the software and data security company. There are three generations...
View ArticleNew products of the week 5.15.17
New products of the weekImage by ArrayOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.FastCollect for Archives Commvault...
View ArticleHow CISOs can answer difficult questions from CEOs
The CEO puts all the trust in the chief security officer to keep the company off the front page and out of danger. But as the number of attacks across the internet skyrockets, that trust has slowly...
View ArticleIncident response is like tracking down a perpetrator
What is incident response?Image by ThinkstockIncident response is like investigating a real burglary. You look for evidence of the intruder at the crime scene, find his targets and his getaway car, and...
View ArticleOutsourcing security: Would you turn over the keys to a third party?
Years ago it would have been unthinkable to give up control to securing your most valuable assets. But for some companies the risk of handing the security keys to a third party is less than the idea...
View ArticleHow to maintain data oversight to avoid ‘shadow data’
Data at riskImage by George HodanBefore his retirement, an employee of the Office of the Comptroller of the Currency (OCC) uploaded more than 10,000 OCC records onto two removable thumb drives. He...
View ArticleNew products of the week 5.22.17
Running its courseImage by UntangleNetwork World's long-running product of the week slideshow has come to an end with this edition. Vendors are still welcome to discuss their products with reporters....
View ArticleHow to conduct an IoT pen test
Penetration testing was much like taking a battering ram to the door of the fortress. Keep pounding away and maybe find a secret backdoor to enter through. But what happens if pieces of the network...
View ArticleTop 5 misconceptions of IoT network and device security
Security in multiplesImage by ShutterstockThe Internet of Things (IoT) describes an interconnected system of standalone devices, which communicate and transfer data within the existing internet...
View ArticleNew products of the week 4.17.17
New products of the weekImage by A10Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.To read this article in full, please click here
View ArticleHow to prevent your mobile app from getting hacked
Trivial matter?Image by Steve Traynor/IDGThe average user has around 26 to 55 applications downloaded to his smartphone device. Most likely, you have entertainment and gaming apps, a banking app, a few...
View ArticleCybersecurity companies to watch
In canvassing the security industry, CBInsights came up with a list of startups with early-to mid-stage high-momentum that have pioneering technology with the potential to transform cybersecurity. They...
View ArticleHealthcare records for sale on Dark Web
Last August a Baltimore substance abuse treatment facility had its database hacked. Patient records subsequently found their way onto the Dark Web, according to DataBreaches.net. The group noticed...
View ArticleUsers have little confidence their company can protect their mobile device
A survey sponsored by Check Point Software Technologies Ltd. found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack, leaving employees' personal...
View Article
More Pages to Explore .....