Security

Network analysis is like turning over rocks

I just found out my company's employees have been finding ways to get around my Web filtering. And that came as a surprise, because I use a best-in-class product that employs a database to categorize and block website URLs, which I thought I could rely on. But as I found out, that product is not perfect.

By By J.F. Rice | 20 June, 2015 05:06

Tags: network security, Network Analysis, Google, security

MEDJACK: Hackers hijacking medical devices to create backdoors in hospital networks

After the Office of Personnel Management breach, medical data was labeled as the "holy grail" for cybercriminals intent on espionage. "Medical information can be worth 10 times as much as a credit card number," reported Reuters. And now to steal such information, hospital networks are getting pwned by malware-infected medical devices.

By Darlene Storm | 09 June, 2015 02:31

Tags: acs, intrusion, Reuters, security, Office of Personnel Management, TrapX, 21, Cybercrime & Hacking

Your next digital security guard should be more like RoboCop

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

By By Mike Paquette, VP of Security Products, Prelert | 05 June, 2015 07:00

Tags: network security, security, Home Depot

Does Fortinet's Meru buy mean we're in for even more Wi-Fi industry consolidation?

Cybersecurity firm Fortinet's purchase last week of wireless network manufacturer Meru Networks for $44 million is the second major acquisition of a Wi-Fi hardware vendor in three months and, potentially, the start of a broader pattern.

By Jon Gold | 05 June, 2015 06:14

Tags: CouchBase, Dell, Gartner, Fortinet, Networking, wireless, Aruba networks, Meru Networks, HP

An insider's guide to the private IPv4 market

We've been hearing about the impending depletion of IPv4 addresses for years, but that day is finally upon us -- the free supply of IPv4 numbers in North America will be completely gone within a month or two.

By Marc Lindsey, Janine Goodman | 28 May, 2015 04:35

Tags: Internet Engineering Task Force, Networking, IETF, LAN & WAN

Five reasons threat intelligence fails today, and how to overcome them

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

By By Jason Cook, VP of Security, BT Americas | 08 May, 2015 00:27

Tags: security

The science behind alert fatigue: How to turn down the noise so you can hear the signal

You've likely experienced alert fatigue at some point in your life. You feel exasperated as your phone pings for what seems like the hundredth time in a day, or your eyes glaze over as a glut of new analytics data rolls in. You feel resigned to the fact that an influx of email could very well go on forever.

By By Marius Moscovici, founder and CEO, Metric Insights | 07 May, 2015 01:53

Tags: Target, security

IT careers: Security talent is red-hot

From the time he was 9, Daniel Kowalski, now 23, knew cybersecurity was going to be his thing. Captivated by the stealth work of hackers in commercials and in his favorite movie, Live Free or Die Hard, Kowalski nurtured his fascination with security from a young age, pursuing multiple IT and security certifications during high school and earning a degree in computer criminology at Florida State University.

By Beth Stackpole | 28 April, 2015 00:37

Tags: security, computerworld, IT Salary Survey 2015, three, IT management

The best way to stop DDoS attacks

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

By By Rene Paap, product marketing manager, A10 Networks | 06 April, 2015 22:54

Tags: network security, ddos, security

Apple Watch won't boost Apple Pay payments by much

The Apple Watch supports Apple Pay, but it's unlikely that the smartwatch, coming April 24, will significantly boost the number of mobile payments made by U.S. customers.

By Matt Hamblen | 02 April, 2015 22:06

Tags: Apple, mobile payments, consumer electronics, finance, industry verticals

Detecting advanced threats with user behavior analytics

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

By By Saryu Nayyar, CEO, Gurucul | 01 April, 2015 08:02

Tags: APT, security

The state of open source security

If there's a poster child for the challenges facing open source security, it may be Werner Koch, the German developer who wrote and for the last 18 years has toiled to maintain Gnu Privacy Guard (GnuPG), a pillar of the open source software ecosystem.

By Paul Roberts | 26 March, 2015 21:09

Tags: linux foundation, security, nsa

Could Facebook be your next phone company?

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

By By Dean Manzoori, Masergy VP for Unified Communications | 21 March, 2015 08:23

Tags: unified communications, WebRTC, telecommunication, W3C, voip, Networking, 3C, LinkedIn, IETF, Facebook

Ransomware: Pay it or fight it?

Ask security experts what to do when hit with ransomware -- the sophisticated malware that infects a device or network, uses military-grade encryption to restrict access, and demands payment for the decryption key -- and you'll typically get the same answer: "never pay the ransom."

By Colin Neagle | 17 March, 2015 00:59

Tags: security, fbi, malware

Why Israel could be the next cybersecurity world power

There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and more focused. They want to be the first place you think about when it comes to cybersecurity research, education, and innovation. If things go right there, it may well happen.

By David Strom | 11 March, 2015 07:24

Tags: Google, Microsoft, security, legal, intel, malware, Bloomberg, cybercrime, starbucks

10 security startups to watch in 2015

A wealth of young security companies is trying to capitalize on businesses moving toward security platforms that help them respond more quickly when they suffer successful cyber attacks in hopes of limiting the damage they do.

By Tim Greene | 11 March, 2015 07:19

Tags: security, computerworld

10 young security companies to watch in 2015

A wealth of young security companies is trying to capitalize on businesses moving toward security platforms that help them respond more quickly when they suffer successful cyberattacks in hopes of limiting the damage they do.

By Tim Greene | 10 March, 2015 21:06

Tags: companies to watch, security, computerworld

Information overload, SIEM version

It's been over a year since I last wrote about my security information and event management (SIEM) platform -- and a lot has happened since then. Back then, I wrote, "Now that my SIEM has been in operation for several months, I've become completely dependent on it, not only for security monitoring, but also for overall awareness of my network."

By By J.F. Rice | 05 March, 2015 23:14

Tags: network security, network bandwidth, security, SIEM

Premier 100 IT Leader: Gerry McCartney

Purdue University wants its students to succeed, and it's using big data to make that happen.

By Rebecca Linke | 23 February, 2015 22:43

Tags: CIO role, Purdue University, IT Leadership, IT management

Browser fingerprints, and why they are so hard to erase

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

By By Lance Cottrell, chief scientist, Ntrepid | 18 February, 2015 01:28

Tags: Web browers, security

Top Whitepapers

Featured Whitepapers