Quantcast
Channel: Network World Ryan Francis
Browsing all 22 articles
Browse latest View live

Third parties leave your network open to attacks

Most businesses hire third-party providers to fill in when they lack in-house resources. It is often necessary to allow third-party vendors access to their network. But after Target’s network was...

View Article



Image may be NSFW.
Clik here to view.

New products of the week 5.8.17

New products of the weekImage by Aspect SoftwareOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Browser Stored Password Discovery...

View Article

Computer forensics follows the bread crumbs left by perpetrators

The boss gets tipped off that an employee might be leaving the company and in so doing is trying to grab as many clients as possible to take with him to his new job. The company brings in computer...

View Article

Image may be NSFW.
Clik here to view.

6 things you need to know about IoT security

Security, trust and data integrityImage by ThinkstockThe emergence of IoT is altering our personal technology security paradigm and is a game-changer in customer/business interaction, in part due to...

View Article

Vendors approve of NIST password draft

A recently released draft of the National Institute of Standards and Technology’s (NIST's) digital identity guidelines has met with approval by vendors. The draft guidelines revise password security...

View Article


Top DRaaS companies to watch

Forrester Research recently released its report naming Sungard AS, Bluelock, IBM and iland as the top disaster recovery-as-a-service companies.With enterprises expecting their network up at all times,...

View Article

Q&A Citrix CSO: How to deal with security across multiple generations of...

Citrix’s CSO Stan Black has been in the cybersecurity field for 20 years. He has seen generations of employees come and go at the software and data security company. There are three generations...

View Article

Image may be NSFW.
Clik here to view.

New products of the week 5.15.17

New products of the weekImage by ArrayOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.FastCollect for Archives Commvault...

View Article


How CISOs can answer difficult questions from CEOs

The CEO puts all the trust in the chief security officer to keep the company off the front page and out of danger. But as the number of attacks across the internet skyrockets, that trust has slowly...

View Article


Image may be NSFW.
Clik here to view.

Incident response is like tracking down a perpetrator

What is incident response?Image by ThinkstockIncident response is like investigating a real burglary. You look for evidence of the intruder at the crime scene, find his targets and his getaway car, and...

View Article

Outsourcing security: Would you turn over the keys to a third party?

Years ago it would have been unthinkable to give up control to securing your most valuable assets. But for some companies the risk of handing the security keys to a third party is less than the idea...

View Article

Image may be NSFW.
Clik here to view.

How to maintain data oversight to avoid ‘shadow data’

Data at riskImage by George HodanBefore his retirement, an employee of the Office of the Comptroller of the Currency (OCC) uploaded more than 10,000 OCC records onto two removable thumb drives. He...

View Article

Image may be NSFW.
Clik here to view.

New products of the week 5.22.17

Running its courseImage by UntangleNetwork World's long-running product of the week slideshow has come to an end with this edition. Vendors are still welcome to discuss their products with reporters....

View Article


How to conduct an IoT pen test

Penetration testing was much like taking a battering ram to the door of the fortress. Keep pounding away and maybe find a secret backdoor to enter through. But what happens if pieces of the network...

View Article

Image may be NSFW.
Clik here to view.

Top 5 misconceptions of IoT network and device security

Security in multiplesImage by ShutterstockThe Internet of Things (IoT) describes an interconnected system of standalone devices, which communicate and transfer data within the existing internet...

View Article


Image may be NSFW.
Clik here to view.

New products of the week 4.17.17

New products of the weekImage by A10Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.To read this article in full, please click here

View Article

Image may be NSFW.
Clik here to view.

How to prevent your mobile app from getting hacked

Trivial matter?Image by Steve Traynor/IDGThe average user has around 26 to 55 applications downloaded to his smartphone device. Most likely, you have entertainment and gaming apps, a banking app, a few...

View Article


Cybersecurity companies to watch

In canvassing the security industry, CBInsights came up with a list of startups with early-to mid-stage high-momentum that have pioneering technology with the potential to transform cybersecurity. They...

View Article

Healthcare records for sale on Dark Web

Last August a Baltimore substance abuse treatment facility had its database hacked. Patient records subsequently found their way onto the Dark Web, according to DataBreaches.net. The group noticed...

View Article

Users have little confidence their company can protect their mobile device

A survey sponsored by Check Point Software Technologies Ltd. found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack, leaving employees' personal...

View Article
Browsing all 22 articles
Browse latest View live




Latest Images