Go to page content
Go to site-wide navigation
Go to Contact Us page
New Data Center
The Challenges of OS Migration
Citrix's Mobile Enterprise 360
Cloud Powered Work
The Essential Guide to Managing Power
Get an Integrated Approach to Data Management
Oracle Cloud KnowledgeVault
Virtualization Boosts SMBs
Your IT Journey — Your Way
Aruba Networks Bring Your Own Device
BlackBerry: Build up your BlackBerry® 10 knowledge
CA Technologies Transform Your IT Strategy
HP + Microsoft Data Management Appliances & Architectures
Network World The Next Generation Firewall Challenge
Network World Data Center Challenge 2012
Riverbed Accelerate Business Performance Solution Center
Riverbed Cascade® Solution Center
View all Solution Centers
LAN & WAN
Open Source Subnet
Firewall & UTM
Collaboration / Web 2.0
3G & 4G
WiMAX & LTE
IT Asked & Answered
Security Research Center
Your source for network security news, opinion, product comparisons and reviews.
Endpoint Forensics Will Become a Mainstream Cybersecurity Technology
Recent Security posts
Security Posts Archive
What Can Be Done About the Cybersecurity Skills Shortage?
Mobile Computing Security Mayhem Continues
McAfee’s Stonesoft Acquisition: A Strategic Enterprise Move With Short- and Long-term Benefits
Network Security Trumps Server Security in the Enterprise (Part 2)
Privacy and penny-pinching points of view about Xbox One
Xbox One is ready to pounce and take over your living room, but plenty of aspects of Microsoft's new system are going to be painful to the wallet and to privacy.
Security Case Studies
How one municipality is securing, managing Google Apps, Docs
FedEx says tracking system "back to normal" after software glitch
AirTran: Virtualization requires network visibility
Researchers warn of increased Zeus malware activity this year
The amount of cybercriminal activity associated with the Zeus family of financial Trojan programs...
Layered defenses largely fail to block exploits, says NSS
Security experts have long touted a layered approach to cyber security as the most effective way to...
Researchers find unusual malware targeting Tibetan users in cyberespionage operation
Security researchers from antivirus vendor ESET discovered a piece of cyberespionage malware...
Google to lengthen SSL encryption keys from August
Google plans to upgrade the security of its SSL (Secure Sockets Layer) certificates, an important...
Microsoft brushes off claim Xbox Live accounts were compromised
Microsoft brushed off a dubious hacker's claim on Thursday that he stole 47 million account...
Twitter's two-step authentication a good start, experts say
For celebrities and the average Joe, having two-factor authentication turned on won't protect...
DHS warns employees that years-old database hole puts their privacy at risk
The Department of Homeland Security (DHS) Thursday said it has notified employees and others with...
U.S. urged to let companies 'hack-back' at IP cyber thieves
U.S. companies should be allowed to take aggressive countermeasures against hackers seeking to...
Researchers find more versions of digitally signed Mac OS X spyware
Security researchers have identified multiple samples of the recently discovered "KitM"...
IT security vendors seen as clueless on industrial control systems
Many IT security vendors have a minimal understanding of industrial control systems (ICS) and try...
Twitter aims to become safer with two-step sign-in
Twitter, in a much-needed move to keep its users safer from cyberattacks, is introducing a more...
Blue Coat Systems to acquire security analytics firm Solera Networks
Blue Coat Systems, a provider of Web traffic filtering and business assurance products and...
U.S. power companies under frequent cyberattack
A survey of U.S. utilities shows many are facing frequent cyberattacks that could threaten a highly...
Aurora hackers said to have accessed law enforcement targets
Chinese cyber marauders sought more than just information on activists -- they wanted access to...
Microsoft may be scanning your Skype messages
If you have any expectations about the privacy of your Skype communications, you may want to...
View more Security News
Smartphones take center stage in two-factor authentication schemes
Microsoft DirectAccess impresses
Java security questions answered
Cisco edges F5 in VPN shootout
Low-cost RADIUS servers for Wi-Fi security
See more Tests
See your link here
Network World's Daily Newsletter
Stay up to date with the most important tech news
Network World, Inc
The Connected Enterprise
Careers @ IDG
Subscribe to Network World Magazine
Reprints & Links
Other IDG Sites
IDG Knowledge Hub
Copyright © 1994 - 2013 Network World, Inc. All rights reserved.