Advertisements


Apple iOS 10.3 packs 20-plus new features & is available now

Apple has made iOS 10.3 publicly available and the software update for its iPhones and iPads is packed with a Find-My-AirPod feature as well as a slew of Siri, CarPlay and other additions.You probably know the routine by now: Head over to the Gene.....»»

Source:  NetworkworldCategory: Security16 min. ago Related News

Toward Strategic and Proactive Threat Intelligence Programs

In 2015, ESG did an in-depth research project on cyber threat intelligence usage at enterprise organizations (i.e. more than 1,000 employees).  The goal of this project was to determine how large firms were using threat intelligence, what challen.....»»

Source:  NetworkworldCategory: Security2 hr. 36 min. ago Related News

Toward Strategic and Proactive Threat Intelligence Programs

In 2015, ESG did an in-depth research project on cyber threat intelligence usage at enterprise organizations (i.e. more than 1,000 employees).  The goal of this project was to determine how large firms were using threat intelligence, what challen.....»»

Source:  NetworkworldCategory: Security2 hr. 36 min. ago Related News

Hitachi reveals new AI for real-time identity detection and tracking

Hitachi announced that it had developed a new image analysis system which uses artificial intelligence for real-time people tracking and detection. The AI can detect an individual in real-time by combining over 100 external characteristics and the.....»»

Source:  NetworkworldCategory: Security3 hr. 52 min. ago Related News

Hitachi reveals new AI for real-time identity detection and tracking

Hitachi announced that it had developed a new image analysis system which uses artificial intelligence for real-time people tracking and detection. The AI can detect an individual in real-time by combining over 100 external characteristics and the.....»»

Source:  NetworkworldCategory: Security3 hr. 52 min. ago Related News

Fortinet CISO on securing critical infrastructure: ‘We can no longer bring a knife to a gunfight’

Earlier this year Fortinet hired its first chief information security officer (CISO). The timing makes sense, as the company has grown into a leading security vendor with an integrated, security fabric vision that few competitors can match.As Fort.....»»

Source:  NetworkworldCategory: Security3 hr. 52 min. ago Related News

New products of the week 3.27.17

New products of the weekImage by Array NetworksOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.NetCrunch Tools 2.0Image by adremTo read this article in full or to leave a comment,.....»»

Source:  NetworkworldCategory: Security8 hr. 28 min. ago Related News

Microsoft axed Docs.com search option after private files were shared publicly

Docs.com, Microsoft’s site which is described as “showcase and discover Microsoft Word, Excel, PowerPoint, OneNote, Sway and PDF document for free,” came under fire over the weekend as Twitter users started complaining that users of the site.....»»

Source:  NetworkworldCategory: SecurityMar 26th, 2017Related News

KC-46 Refueling Tanker Faces More Delays, Auditors Say

A new study suggests the Air Force’s KC-46 refueling tanker has saved $7.3 billion in lifetime costs for the program but could face additional delays.... A new study suggests the Air Force’s KC-46 refueling tanker has saved $7.3 billi.....»»

Source:  DefensetechCategory: SecurityMar 25th, 2017Related News

Complete security deception includes detection and incident response

Deception tools have been growing in popularity over the past several years, but customers need to ensure they are using the technology to its fullest potential. The concept behind deception is fairly simple to understand: Security teams deploy a.....»»

Source:  NetworkworldCategory: SecurityMar 24th, 2017Related News

Blockchain can help secure medical devices, improve patient privacy

BOSTON -- Blockchain can help secure medical devices and improve patient privacy, but the key is proper implementation, according to a top security pro at Partners Healthcare.The downsides would include mistrust of the technology because of blockc.....»»

Source:  NetworkworldCategory: SecurityMar 24th, 2017Related News

Bitcoin rise fuels social media scams

The price of a single Bitcoin passed that of an ounce of gold for the first time this month, and scammers were quick to get in on the action with Ponzi schemes and phishing sites spread via social media.Victims are lured in with fake Bitcoin walle.....»»

Source:  NetworkworldCategory: SecurityMar 24th, 2017Related News

Review: Canary Flex security camera lives up to its name

Canary’s initial foray into the networked home security camera space was very impressive – my colleague David Newman touted its high security settings in the wake of revelations about the general insecurity of these types of devices. The Canar.....»»

Source:  NetworkworldCategory: SecurityMar 24th, 2017Related News

IDG Contributor Network: 7 best practices for securing your cloud service

As enterprises move their applications and data to the cloud, executives increasingly face the task of balancing the benefits of productivity gains against significant concerns about compliance and security.Security in the cloud is not the same as.....»»

Source:  NetworkworldCategory: SecurityMar 24th, 2017Related News

CIA, WikiLeaks and Doctor Who?

CSO Online's Steve Ragan and Joan Goodchild chat about the hot security news of the week, including their take on the recent WikiLeaks revelations around the CIA, and how Cisco, Samsung and Apple have responded to the information......»»

Source:  NetworkworldCategory: SecurityMar 24th, 2017Related News

Review: Canary Flex security camera lives up to its name

Canary’s initial foray into the networked home security camera space was very impressive – my colleague David Newman touted its high security settings in the wake of revelations about the general insecurity of these types of devices. The Canar.....»»

Source:  NetworkworldCategory: SecurityMar 24th, 2017Related News

IDG Contributor Network: 7 best practices for securing your cloud service

As enterprises move their applications and data to the cloud, executives increasingly face the task of balancing the benefits of productivity gains against significant concerns about compliance and security.Security in the cloud is not the same as.....»»

Source:  NetworkworldCategory: SecurityMar 24th, 2017Related News

Consultant urges never pay ransomware demands

When ransomware criminals lock up files and demand payment to decrypt them, don’t pay, was the advice a consultant gave to a group at SecureWorld.When there’s no risk of losing crucial data, that’s easy to say, and to make is possible requir.....»»

Source:  NetworkworldCategory: SecurityMar 24th, 2017Related News

Marines to Test 100 New Beach-Storming Technologies

When you think of ship-to-shore maneuver and amphibious assaults, Marine Corps planners want to banish the image of an Iwo Jima-style beach landing. Instead, they... When you think of ship-to-shore maneuver and amphibious assaults, Marine Corps p.....»»

Source:  DefensetechCategory: SecurityMar 24th, 2017Related News

Army Eyes Dual-Rotor Drone for Casualty-Evacuation

Dragonfly Pictures Inc.’s DP14 Hawk, a dual-rotor unmanned aerial system, could play a role in a U.S. Army effort to one day use drones to... Dragonfly Pictures Inc.’s DP14 Hawk, a dual-rotor unmanned aerial system, could play a role.....»»

Source:  DefensetechCategory: SecurityMar 23rd, 2017Related News