Security » Features »

  • An insider's guide to the private IPv4 market

    We've been hearing about the impending depletion of IPv4 addresses for years, but that day is finally upon us -- the free supply of IPv4 numbers in North America will be completely gone within a month or two.

  • Could Tesla Energy's batteries blow up Elon Musk's company?

    Tesla CEO Elon Musk is no stranger to risky but successful ventures. He's helped found companies such as PayPal and other leading edge tech firms, including an aerospace manufacturer to help colonize Mars.

  • Five reasons threat intelligence fails today, and how to overcome them

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

  • The science behind alert fatigue: How to turn down the noise so you can hear the signal

    You've likely experienced alert fatigue at some point in your life. You feel exasperated as your phone pings for what seems like the hundredth time in a day, or your eyes glaze over as a glut of new analytics data rolls in. You feel resigned to the fact that an influx of email could very well go on forever.

  • IT careers: Security talent is red-hot

    From the time he was 9, Daniel Kowalski, now 23, knew cybersecurity was going to be his thing. Captivated by the stealth work of hackers in commercials and in his favorite movie, Live Free or Die Hard, Kowalski nurtured his fascination with security from a young age, pursuing multiple IT and security certifications during high school and earning a degree in computer criminology at Florida State University.

  • The best way to stop DDoS attacks

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

  • Detecting advanced threats with user behavior analytics

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

  • The state of open source security

    If there's a poster child for the challenges facing open source security, it may be Werner Koch, the German developer who wrote and for the last 18 years has toiled to maintain Gnu Privacy Guard (GnuPG), a pillar of the open source software ecosystem.

  • Could Facebook be your next phone company?

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

  • Ransomware: Pay it or fight it?

    Ask security experts what to do when hit with ransomware -- the sophisticated malware that infects a device or network, uses military-grade encryption to restrict access, and demands payment for the decryption key -- and you'll typically get the same answer: "never pay the ransom."

  • Why Israel could be the next cybersecurity world power

    There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and more focused. They want to be the first place you think about when it comes to cybersecurity research, education, and innovation. If things go right there, it may well happen.

  • Six entry-level cybersecurity job seeker failings

    When it comes to hiring, enterprise security teams can use all of the help that they can rally. But when it comes to hiring entry-level talent, that's not as easy as it may seem.

  • 10 security startups to watch in 2015

    A wealth of young security companies is trying to capitalize on businesses moving toward security platforms that help them respond more quickly when they suffer successful cyber attacks in hopes of limiting the damage they do.

  • Six failings common to entry-level cyber security job seekers

    When it comes to hiring, enterprise security teams can use all of the help that they can rally. But when it comes to hiring entry-level talent, that's not as easy as it may seem.

  • 10 young security companies to watch in 2015

    A wealth of young security companies is trying to capitalize on businesses moving toward security platforms that help them respond more quickly when they suffer successful cyberattacks in hopes of limiting the damage they do.

  • Information overload, SIEM version

    It's been over a year since I last wrote about my security information and event management (SIEM) platform -- and a lot has happened since then. Back then, I wrote, "Now that my SIEM has been in operation for several months, I've become completely dependent on it, not only for security monitoring, but also for overall awareness of my network."

  • Premier 100 IT Leader: Gerry McCartney

    Purdue University wants its students to succeed, and it's using big data to make that happen.

  • Browser fingerprints, and why they are so hard to erase

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

  • President's cyber security summit: Share attack info but protect privacy, civil liberties

    Participants in the White House Summit on Cybersecurity and Consumer Protection on Friday called for government/private sector information sharing, updated regulations, and improving the trust citizens have in the government's respect for privacy and civil liberties.

  • Awareness on the cheap

    You don't have to spend a lot of money on some information security initiatives. Take security awareness, for example. You can get huge returns with small investments.