Target's statement to customers on massive data breach
From retailer Target on December 19, 2013
Network World staff | 19 Dec | Read more
From retailer Target on December 19, 2013
Network World staff | 19 Dec | Read more
Go Daddy Site Outage Investigation Completed (Sept. 11, 2012)
Network World staff | 08 Nov | Read more
The United States is a country ruled by law, where all charges and allegations should be based on solid evidence and facts. The report conducted by the House Permanent Select Committee on Intelligence (the Committee), which took 11 months to complete, failed to provide clear information or evidence to substantiate the legitimacy of the Committee's concerns.
Network World staff | 09 Oct | Read more
If it is left to the politicians, the door to the nation's utilities might be left open. Almost telling terrorists, like in those motel commercials, "We'll leave the light on for you."
Network World staff | 07 Aug | Read more
Network security is still as necessary as it was 15 years ago when the Black Hat Conference was first beginning. Sure the players have changed and the sophistication, but it is a classic good vs. evil scenario still.
Network World staff | 31 Jul | Read more
Flame malware is considered ingenious by network security researchers. They say the botnet has the most complex command and control structures ever seen.
Network World staff | 12 Jun | Read more
Check out these browser-based tools to keep up on the latest cyber security threats
Network World staff | 13 Mar | Read more
Certain Web sites probe visiting browsers for data that can be used to help criminals craft phishing attacks that compromise the accounts of online banking customers, researchers have found.
Network World staff | 04 Dec | Read more
Remember the old M&M analogy - security is like an M&M candy, hard shell on the outside, soft on the inside. In other words, put up firewalls, built a strong perimeter and you're good to go. Of course, nobody believes that M&M-type security is sufficient in today's world of insider threats, data leakage, mobile workers, thumb drives and sophisticated malware. So, what's the new metaphor? We asked around and came up with a number of interesting and useful ways to think about enterprise security.
Network World staff | 15 Jul | Read more
This is a transcript of a keynote address presented at the RSA Conference on Thursday by Dave Hansen, corporate senior vice president and general manager for CA's Security Management Business Unit. The address is titled: "Strategic Security: The Evolving Role of the Security Professional."
Network World staff | 14 Apr | Read more
What is true enterprise security and how do you get it? Bogus promises by vendors are all too common. In this interview, outspoken security analyst Nick Selby humorously tackles the truth about data leakage products, smartphone protection, hotspot threats and the word "solution." Nick Selby leads The 451 Group's Enterprise Security Practice. Selby also serves as The 451 Group's Director of Research Operations and is on the faculty of the Institute for Applied Network Security.
Network World staff | 14 Mar | Read more
Network access control stands out as one of the most promising security technologies, but it also is one of the most misunderstood. Here are explanations that may clarify some of your questions.
Network World staff | 04 Jan | Read more
A Look at the all time greatest controversies in the history of the networking industry.
Network World staff | 30 Oct | Read more
The words "horror," "Hell," and "torture" have popped up in headlines more often than one might think. Since it's Halloween week, we thought it would be a good time to reflect on just how scary computers can be.
Network World staff | 31 Oct | Read more
University of California, San Diego researchers last week got a chance to test out a host of network technologies on something they hope they will never really have to be used for: a terrorist attack.
Network World staff | 31 Aug | Read more