Search This Blog

Thursday, December 01, 2011

How do you keep your security workforce?

Google Translate glitch opens security hole | They're never too young to learn about passwords

Network World Security

Forward this to a Friend >>>


How do you keep your security workforce?
Recruiting and retaining important IT staff -- particularly in the burgeoning security arena -- is a challenge for every organization and one that is only going to tougher. Read More


WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

WHITE PAPER: Splice Communications

The Real Cost of Dealing with Carriers
What is the TCO for your company's data network services and solutions? If you work with one of the large carriers, it's probably a lot higher than you think. Read Now!

Google Translate glitch opens security hole
Developers moving to the upcoming paid version of Google Translate need to follow the documentation so their implementation of the package doesn't lead them to paying for someone else's use of the platform. Read More

They're never too young to learn about passwords
That the little girl had a netbook was slightly surprising, given that she couldn't have been older than seven or eight. But her conversation with her Mom about the machine - overheard at my son's basketball practice -- wasn't surprising at all, unfortunately. "Mommy, my password isn't working." (Hands netbook to Mom.) "What's your password again, sweetie?" "Password." Read More


WHITE PAPER: Quest Software

Create a Solid Backup Strategy
The simpler a backup plan is to plan and execute, the more likely it is to be done. Read Now!

Start-up Agari debuts with security to stop fake e-mail, phishing attacks
Start-up Agari debuts today with cloud-based e-mail security services aimed at allowing enterprises and e-commerce companies to identify and block fake and spoofed e-mail exploiting their legitimate business domain names to conduct scams and phishing attacks. Read More

Duqu hackers scrub evidence from command servers, shut down spying op
The hackers behind the Duqu botnet have shut down their snooping operation, according to Moscow-based Kaspersky Lab. Read More


WHITE PAPER: Dell

Mobility KnowledgeVault
The resources in this Mobility KnowledgeVault provide expert guidance, peer advice, survey results and best practices to help you protect your mobile infrastructure. From determining a policy for employee-owned devices and data encryption to supporting the six major mobile operating systems, securing mobile devices and data is a top priority. View now

Another SCADA threat? Well, only if you count white-lightning as a hazard
After this month's now disputed cyber-attack on an Illinois water authority site, you can't blame the utility industry for being a bit under stress. Perhaps such stress relief was what one water department employee had in mind when he allegedly set up a moonshine operation using the Groton, Mass., water supply facility. Read More

Bill would allow US intelligence to share cyber-threat info
A new bill introduced by senior members of the U.S. House of Representatives Intelligence Committee would allow intelligence agencies to share classified cyber-threat information with approved U.S. companies, while encouraging companies to share their own information. Read More

The CFO's role in the data breach war
The disturbing rash of data breaches in recent years has demonstrated that data security -- always a huge concern of CFOs -- affects every company and its customers. Entertainment sites, clothing retailers, grocers, financial services institutions are only the latest and most obvious of organizations to have had IT systems compromised, or sensitive information stolen. Read More



SLIDESHOWS

Top IT Turkeys of 2011
You know, it just doesn't feel like Thanksgiving to me unless I have mashed potatoes, pumpkin pie, and an iPad with the annual Network World Top IT Turkeys slideshow all arranged on the table for the feast. So let's sharpen our knives and get to the carving, because these turkeys are getting cold.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Facebook under privacy watch for 20 years
  2. Hackers target IPv6
  3. 25 free open source projects IT pros will love
  4. iPhone self-combusts over Australian skies
  5. Cisco, Juniper, Check Point, Palo Alto among firms in security contest
  6. iPhone 5 rumor roll-up for the week ending Nov. 25
  7. Hackers launch millions of Java exploits, says Microsoft
  8. Cisco tells HP to lose that suit
  9. RIM to offer multiplatform device management
  10. Free software activists to take on Google with new free search engine

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: