Search This Blog

Thursday, March 08, 2012

Can big data nab network invaders?

  NASA chief says IT security issues will not impact missions – Congress wants more details | Daylight saving time awakens cyberslacking zombies
 
  Network World Security

Forward this to a Friend >>>


Can big data nab network invaders?
The buzz in security circles about "big data" goes something like this: If the enterprise could only unite its security-related event data with a warehouse of business information, it could analyze this Big Data to catch intruders trying to steal sensitive information. Read More


RESOURCE COMPLIMENTS OF: Cisco

Do You Need to Lock It Down or Free It Up?
With companies moving towards the cloud, trends in BYOD, and stricter policy enforcement requirements, every CIO needs more transparent and efficient networks. Christopher Young, SVP of Cisco's Security and Government Group, reveals how context awareness and security enablement empower businesses to embrace the global workforce and mitigate risk. Watch the keynote

RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
If you thought that public cloud providers protect your cloud servers from harmful intrusions and other security threats - think again. The burden of securing your cloud servers typically rests with you. Register today to secure 25 cloud servers for free with the award-winning CloudPassage Halo.

NASA chief says IT security issues will not impact missions – Congress wants more details
While NASA administrator Charles Bolden bobbed and weaved around questions about NASA's IT security issues today saying there have never been any disruptions nor impacts on a space mission as a result of security problems, it was clear the Senate panel listening to him wasn't satisfied with his answers. Read More

Daylight saving time awakens cyberslacking zombies
Can the upcoming time change turn productive, only-on-the-web-for-work employees into zombie cyberslackers bent on destroying efficiency? Researchers in a report garnered from pouring over Google searches from the last six years say data show the shift to daylight saving time and its accompanying loss of sleep cause employees to spend more time than normal surfing the Web for content unrelated... Read More

Privacy Invasion: Social media monitoring required to attend college or to be hired?
Sometimes social networking comes back to bite you with privacy invasion such as when attorneys snoop on social networks to vet jurors or potential employers pry into social media before hiring employees. Sometimes it might be drunken posts or photos that do a person in. Read More


WHITE PAPER: NetIQ

Security Information and Event Management eGuide
Security threats these days are increasingly focused on critical components of enterprise infrastructures – the servers, databases, and directories that store and manage crucial corporate information. Learn More!

Inside Apple's iPad world-wide ubiquity
As iPad 3 emerges, we look at the iPad as a cultural phenomenon Read More

RSA Observations Part II
I missed the keynotes at RSA as I was buried with wall-to-wall meetings from the time I arrived on Monday through Thursday evening. Nevertheless, I had to chance to speak with a lot of security industry insiders and IT security professionals during my time at RSA. Building on my previous blog, here are a few additional take-aways: Read More

Anonymous takes down security firm's website, vows to fight on after arrests
Hackers claiming to belong to the Anonymous hacking collective early Wednesday defaced Panda Security's PandaLabs website in apparent response to the arrests of five hackers Tuesday in the U.K. and the U.S. Read More


WHITE PAPER: Oracle

A Five-Step Action Plan for Executives
Download this whitepaper, Get Serious About SOA Governance: A Five-Step Action Plan for Executives to see why many organizations are reaping the rewards of successful SOA transformations and what you need to do to make yours one of them. Read More!

Fake AV attack targets Wordpress users
Security company Websense has detected a new wave of mass-injections of a well-known rogue antivirus campaign, targeting websites hosted by the WordPress content management system. Read More

Iranian nuclear program used as lure in Flash-based targeted attacks
A new targeted email attack is exploiting interest in the Iranian nuclear program to trick people into opening booby-trapped Word documents that exploit a known Flash Player vulnerability to install malware. Read More

Healthcare Industry CIOs, CSOs Must Improve Security
Given that stolen medical records can bring $50 apiece on the underground market, the frequency and magnitude of data breaches involving electronic health records is increasing. In an effort to help CIOs and CSOs build a better business case for enhancing security, a group of standards and security organizations have issued a new report on the financial impact of such data breaches. Read More

 
 
 

SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. The last iPad 3 rumor rollup
  2. If the 'ridiculous' Dow had chosen Apple instead of Cisco
  3. 'Big data' creating big career opportunities for IT pros
  4. Inside Apple's iPad world-wide ubiquity
  5. Windows 8 mobiles may top iPad 3 for business deployment
  6. Tiny Linux computer punches above its weight
  7. Windows 8 is great but ...
  8. iPhone 5 rumor rollup for the week ending March 2
  9. Apple iPad 3 din won't drown out business' Windows 8 interest
  10. Get Hadoop certified ... fast
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: