Asia's Source for Enterprise Network Knowledge

Friday, March 24th, 2017

Security

CISM or CISSP: which security certification is for you?

With won different certification programs, which is the best for your career? 

​Security strategies shift as detection and response priorities prevail

Spending on enhancing detection and response capabilities is expected to be a key priority for security buyers through 2020.

 

How much is a bug worth?

Bugcrowd shows how a bug bounty amount is calculated

 

Some HTTPS inspection tools might weaken security

Many security products that intercept HTTPS traffic don't properly validate certificates, US-CERT has warned

 

Why cloud is thriving and app services have to keep up

How an organization’s cloud journeymay unfold depends heavily on robust application services

NWA December 2016 issue

Check out the latest Network World Asia's Readers' Choice 2016 winners! 

Hackers use dangerous Petya ransomware in targeted attacks

The attackers patch Petya on the fly to use their own encryption key, bypassing the malware's original creators in the process

 

Cobol plays major role in U.S. government breaches

Modernizing government system offers best security protection

 

Cobol plays major role in U.S. government breaches

Modernizing government system offers best security protection

 

Unpatched vulnerability puts Ubiquiti networking products at risk

The flaw can allow attackers to execute arbitrary commands as root on affected devices