Security

The best way to stop DDoS attacks

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

By By Rene Paap, product marketing manager, A10 Networks | 06 April, 2015 22:54

Tags: network security, ddos, security

Apple Watch won't boost Apple Pay payments by much

The Apple Watch supports Apple Pay, but it's unlikely that the smartwatch, coming April 24, will significantly boost the number of mobile payments made by U.S. customers.

By Matt Hamblen | 02 April, 2015 22:06

Tags: Apple, mobile payments, consumer electronics, finance, industry verticals

Detecting advanced threats with user behavior analytics

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

By By Saryu Nayyar, CEO, Gurucul | 01 April, 2015 08:02

Tags: APT, security

The state of open source security

If there's a poster child for the challenges facing open source security, it may be Werner Koch, the German developer who wrote and for the last 18 years has toiled to maintain Gnu Privacy Guard (GnuPG), a pillar of the open source software ecosystem.

By Paul Roberts | 26 March, 2015 21:09

Tags: linux foundation, security, nsa

Could Facebook be your next phone company?

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

By By Dean Manzoori, Masergy VP for Unified Communications | 21 March, 2015 08:23

Tags: unified communications, WebRTC, telecommunication, W3C, voip, Networking, 3C, LinkedIn, IETF, Facebook

Ransomware: Pay it or fight it?

Ask security experts what to do when hit with ransomware -- the sophisticated malware that infects a device or network, uses military-grade encryption to restrict access, and demands payment for the decryption key -- and you'll typically get the same answer: "never pay the ransom."

By Colin Neagle | 17 March, 2015 00:59

Tags: security, fbi, malware

Why Israel could be the next cybersecurity world power

There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and more focused. They want to be the first place you think about when it comes to cybersecurity research, education, and innovation. If things go right there, it may well happen.

By David Strom | 11 March, 2015 07:24

Tags: Google, Microsoft, security, legal, intel, malware, Bloomberg, cybercrime, starbucks

10 security startups to watch in 2015

A wealth of young security companies is trying to capitalize on businesses moving toward security platforms that help them respond more quickly when they suffer successful cyber attacks in hopes of limiting the damage they do.

By Tim Greene | 11 March, 2015 07:19

Tags: security, computerworld

10 young security companies to watch in 2015

A wealth of young security companies is trying to capitalize on businesses moving toward security platforms that help them respond more quickly when they suffer successful cyberattacks in hopes of limiting the damage they do.

By Tim Greene | 10 March, 2015 21:06

Tags: companies to watch, security, computerworld

Information overload, SIEM version

It's been over a year since I last wrote about my security information and event management (SIEM) platform -- and a lot has happened since then. Back then, I wrote, "Now that my SIEM has been in operation for several months, I've become completely dependent on it, not only for security monitoring, but also for overall awareness of my network."

By By J.F. Rice | 05 March, 2015 23:14

Tags: network security, network bandwidth, security, SIEM

Premier 100 IT Leader: Gerry McCartney

Purdue University wants its students to succeed, and it's using big data to make that happen.

By Rebecca Linke | 23 February, 2015 22:43

Tags: CIO role, Purdue University, IT Leadership, IT management

Browser fingerprints, and why they are so hard to erase

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

By By Lance Cottrell, chief scientist, Ntrepid | 18 February, 2015 01:28

Tags: Web browers, security

President's cyber security summit: Share attack info but protect privacy, civil liberties

Participants in the White House Summit on Cybersecurity and Consumer Protection on Friday called for government/private sector information sharing, updated regulations, and improving the trust citizens have in the government's respect for privacy and civil liberties.

By Tim Greene | 18 February, 2015 01:22

Tags: white house, cybersecurity, Apple, security, Kaiser Permanente, Stanford University

So Cal Edison's path to the center of the H-1B debate

Southern California Edison was known for good pay and benefits before it began laying off IT workers and replacing them with H-1B visa holders.

By Patrick Thibodeau | 13 February, 2015 07:46

Tags: services, EE, outsourcing, IEEE-USA, IT outsourcing

Awareness on the cheap

You don't have to spend a lot of money on some information security initiatives. Take security awareness, for example. You can get huge returns with small investments.

By By Mathias Thurman | 13 February, 2015 01:13

Tags: security, security awareness

Security Manager's Journal: Breaches are everywhere

Follow me, if you will, on a journey back in time to just one year ago. As 2013 turned into 2014, the information security industry was buzzing about the latest spate of breaches. Target had ushered in a new era of retail security breaches, with 40 million card numbers lost to the hackers. Little did we know at the time that this was just the beginning, and small potatoes in comparison to what was to come. One year ago, Neiman Marcus and Michaels had joined Target, and I wrote in response to the growing number of breach disclosures that "in fact, I have to wonder which retailers have not suffered breaches. The word on the street is that at least a half-dozen other retailers were compromised in the past few months, without publicity." Sadly, this turned out to be true. I hate being right all the time.

By By J.F. Rice | 12 February, 2015 05:01

Tags: Target, intrusion, security, data breach, Neiman Marcus, Michaels, Cybercrime & Hacking

NSA approves Samsung and Boeing mobile devices for employee use

As part of the NSA's program to certify commercial off-the-shelf technology for use inside the agency, mobile devices from Samsung and Boeing have been cleared for use by NSA employees.

By By Dirk A. D. Smith | 10 February, 2015 04:59

Tags: galaxy, samsung, boeing, security, nsa, Kno

Breaches are a personal nightmare for corporate security pros

Beyond the compromise of valuable information, loss of revenues and damage to brand reputation, data breaches can pose a threat to the careers of security professionals involved: witness the sudden departures of both the CEO and the CIO of Target after last year's compromise of 40 million customers' credit cards.

By Tim Greene | 29 January, 2015 02:48

Tags: Target, security, data breach, sony

Lessons from the Sony breach in risk management and business resiliency

2014 made it clear that cybercrime affects everyone. From retailers to banks, consumer goods companies and health care, there isn't an industry left untouched by cybercriminals looking to disrupt, steal or embarrass. So what has to change? The recent Sony attack and countless other examples point to the need for board members and executives to consider cybersecurity under the concept of risk management and business resilience.

By By Adam Meyer, Chief Security Strategist, SurfWatch Labs, a cyber risk intelligence company | 10 January, 2015 05:08

Tags: network security, breach, security, sony

10 lessons U.S. tech managers can learn from their counterparts in China

China is on a technological roll these days -- one that American companies ignore at their own peril. Contrary to outdated Western perceptions, 680 million Chinese have access to either a laptop or a mobile phone, and some 95% of homes in every city in China are now wired for the Internet, according to figures from the Chinese government.

By Bill Marcus | 05 January, 2015 22:35

Tags: IDC, CIO role, China, IT Leadership, U.S. Census Bureau, IT management

Top Whitepapers

Featured Whitepapers