New products of the weekImage by invrisionOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Comodo Internet Security 10Image by ComodoTo read this article in full or to leave a comment, please click here
Boring training sessions?Image by ThinkstockAt their worst, security awareness training sessions are boring wastes of time, both for employees and the IT people responsible for them. At their best, however, they are interactive, discussion-driven, and genuinely helpful opportunities to raise security issues and lay the groundwork for better habits.To read this article in full or to leave a comment, please click here
Boring training sessions?Image by ThinkstockAt their worst, security awareness training sessions are boring wastes of time, both for employees and the IT people responsible for them. At their best, however, they are interactive, discussion-driven, and genuinely helpful opportunities to raise security issues and lay the groundwork for better habits.To read this article in full or to leave a comment, please click here
Sticking with your promisesImage by ThinkstockLike anyone else, security experts set up resolutions they hope to conquer in the new year. Now the question will remain, will they be able to follow through on them or -- like that diet people promised to hold to – will they go back to the same old habits.To read this article in full or to leave a comment, please click here
Sticking with your promisesImage by ThinkstockLike anyone else, security experts set up resolutions they hope to conquer in the new year. Now the question will remain, will they be able to follow through on them or -- like that diet people promised to hold to – will they go back to the same old habits.To read this article in full or to leave a comment, please click here
Keeping the lights onImage by ThinkstockMost businesses are critically reliant upon their IT systems. If these systems go down due to a natural disaster, temporary power outage, loss of data center, ransomware or hacker attack, lost or corrupted files, or an application failure due to a software virus, the results can inflict significant financial harm. In the worst case, the business will be unable to continue functioning.To read this article in full or to leave a comment, please click here
Keeping the lights onImage by ThinkstockMost businesses are critically reliant upon their IT systems. If these systems go down due to a natural disaster, temporary power outage, loss of data center, ransomware or hacker attack, lost or corrupted files, or an application failure due to a software virus, the results can inflict significant financial harm. In the worst case, the business will be unable to continue functioning.To read this article in full or to leave a comment, please click here
DowntimeImage by Thinkstock2016 has seen major downtime events lead to lost revenue for a number of highly-recognizable brands and caused a severe knock to their reputation and consumer confidence. One of the most common causes of outages is unplanned configuration changes to a system, often when an immediate fix for a bug or potential system vulnerability unintentionally creates a much larger problem.To read this article in full or to leave a comment, please click here
DowntimeImage by Thinkstock2016 has seen major downtime events lead to lost revenue for a number of highly-recognizable brands and caused a severe knock to their reputation and consumer confidence. One of the most common causes of outages is unplanned configuration changes to a system, often when an immediate fix for a bug or potential system vulnerability unintentionally creates a much larger problem.To read this article in full or to leave a comment, please click here
Getting duped online by a cybercriminal is infuriating. You let your guard down for a minute and the thieves find their way in to your machine.And then the “fun” begins if ransomware is involved. Hopefully you have your data backed up, but if not now starts the dance with those who have ultimately taken you hostage. Ransomware is obviously analogous to kidnapping, and dealing with the perpetrators can feel much like negotiating with a jumper standing on the edge of high-rise roof.Look no further for help than the Institute for Critical Infrastructure Technology report that in part describes how to deal with criminals when they are holding your data hostage. The report talks of what to do once a breach has been found.To read this article in full or to leave a comment, please click here
Getting duped online by a cybercriminal is infuriating. You let your guard down for a minute and the thieves find their way in to your machine.And then the “fun” begins if ransomware is involved. Hopefully you have your data backed up, but if not now starts the dance with those who have ultimately taken you hostage. Ransomware is obviously analogous to kidnapping, and dealing with the perpetrators can feel much like negotiating with a jumper standing on the edge of high-rise roof.Look no further for help than the Institute for Critical Infrastructure Technology report that in part describes how to deal with criminals when they are holding your data hostage. The report talks of what to do once a breach has been found.To read this article in full or to leave a comment, please click here
AutomationImage by ThinkstockThere’s no doubt about it, networks are becoming increasingly complex, and between connecting to high-powered data centers, spinning up cloud deployments and ensuring constant connectivity – all while keeping costs down – IT teams are feeling the pressure. So, how can they do it all, do it well and keep within a tight budget? Automation.To read this article in full or to leave a comment, please click here
As if holding your data hostage and seeking cash payment weren’t harsh enough, security experts foresee the next stage of ransomware to be even worse.Scott Millis, CTO at mobile security company Cyber adAPT, expects ransomware to spin out of control in the year ahead. That is an astounding statement when you consider that there were more than 4,000 ransomware attacks daily in 2016, according to Symantec’s Security Response group (Report).Corey Nachreiner, CTO at WatchGuard Technologies, predicts that 2017 will see the first ever ransomworm, causing ransomware to spread even faster.To read this article in full or to leave a comment, please click here
As if holding your data hostage and seeking cash payment weren’t harsh enough, security experts foresee the next stage of ransomware to be even worse.Scott Millis, CTO at mobile security company Cyber adAPT, expects ransomware to spin out of control in the year ahead. That is an astounding statement when you consider that there were more than 4,000 ransomware attacks daily in 2016, according to Symantec’s Security Response group (Report).Corey Nachreiner, CTO at WatchGuard Technologies, predicts that 2017 will see the first ever ransomworm, causing ransomware to spread even faster.To read this article in full or to leave a comment, please click here
New products of the weekImage by DabkicksOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Cumulus Linux 3.2Image by Cumulus NetworksTo read this article in full or to leave a comment, please click here
New products of the weekImage by DabkicksOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Cumulus Linux 3.2Image by Cumulus NetworksTo read this article in full or to leave a comment, please click here
Shortage still?Image by EthanMany reports touted the fact that there are not enough workers with the proper cybersecurity skills necessary to fill all the vacant jobs. Forrester suggests looking to external expertise and automation for a quarter of the work. The complexity curve facing enterprises hasn’t reached its peak yet, which leaves security stuck solving problems of capacity and capability with limited resources already burdened with too many technologies, too many alerts, and too much to do. This combined spending will include security outsourcing, managed security services, security consultants and integrators, and security automation technologies.To read this article in full or to leave a comment, please click here(Insider Story)
New products of the weekImage by Cybereason.Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Cloud Foundry Training PlatformImage by altorosTo read this article in full or to leave a comment, please click here
New products of the weekImage by Cybereason.Our roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Cloud Foundry Training PlatformImage by altorosTo read this article in full or to leave a comment, please click here