Search This Blog

Tuesday, August 28, 2012

IT's 9 biggest security threats

'Big Security' a Natural, Necessary Extension of Big Data | Software-defined Security?

Network World Security

Forward this to a Friend >>>


IT's 9 biggest security threats
Hacking has evolved from one-person crime of opportunity to an open market of sophisticated malware backed by crime syndicates and money launders Read More


RESOURCE COMPLIMENTS OF: Sophos

FREE Securing Smartphones & Tablets for Dummies Book
Learn how to build a mobile security strategy and prevent data loss. Get your eBook today.

WHITE PAPER: McAfee

What's Holding Back the Cloud?
This report captures key findings from a blind survey of 800 IT professionals in four countries — China, Germany, the United Kingdom and the United States — that provide insight into cloud computing security concerns, and how those concerns might be alleviated. Learn more in the McAfee Securing Cloud-Based Services KnowledgeVault. Learn more.

'Big Security' a Natural, Necessary Extension of Big Data
Big data is poised to grow well beyond the enterprise - and anything we can imagine today. Think of how the assembly line changed the automobile and, consequently, our lives. Keeping big data secure will require an equally innovative approach. CIO.com columnist Bernard Golden calls it 'big security,' and he doesn't think the industry is ready for it yet. Read More

Software-defined Security?
Security continues to be a major hurdle for server virtualization and cloud computing so we are likely to hear a lot of cybersecurity buzz coming out of VMworld this week. Leading up to the show, I've heard a few people pushing a new marketing term into the mix – Software-defined Security (SDS?). Now I certainly get why this term makes sense in terms of product branding. Software-defined Networking... Read More


WHITE PAPER: CA Technologies

Transforming IT Processes and Culture
Based on market research and case studies, this thought-provoking white paper shows you how innovative IT organizations are launching "overlay teams" to visualize and manage services from a cross-silo perspective. Learn More

FAA to reevaluate inflight portable electronic device use – no cell phones though
If you have been on a commercial airline, the phrase "The use of any portable electronic equipment while the aircraft is taxiing, during takeoff and climb, or during approach and landing," is as ubiquitous but not quite as tedious as "make sure your tray tables are in the secure locked upright position." Read More

Hot Products at VMworld 2012
Click through all the products being released at VMworld in San Francisco this week Read More


WHITE PAPER: Good Technology

Data Loss Prevention eBook: Beyond Mobile Device Management
Critical business data, intellectual property, and sensitive information are spread throughout your organization on servers and desktops they're also being transmitted to smartphones and tablets. Learn how to go beyond device control to manage mobile apps and user interactions. Read Now!

10 Online Reputation Management Tips for Businesses
When people search for your business, they should ideally find your company website, your social media accounts and positive posts on review sites. These 10 tips will help your efforts to achieve that lofty goal. Read More

Security Manager's Journal: Closing off a hole in Outlook
With Outlook Anywhere, users can download their mail to untrusted PCs and leave sensitive documents behind. Read More



SLIDESHOWS

9 ex-Googlers on the move
Former Google employees continue to make their mark on the tech world.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 5 reasons Android users will switch to the iPhone 5
  2. IT's 9 biggest security threats
  3. iPhone 5 rumor rollup for the week ending Aug. 24
  4. Dell, HP say Windows 8 is trashing PC sales
  5. What's next for Brocade?
  6. What the Apple-Samsung verdict means to you
  7. Would you open your home to a hacker -- for free?
  8. 60-minute security makeover: Prevent your own 'epic hack'
  9. Apple sued precisely because Samsung wasn't innovating
  10. Jury decides in Apple's favor, Samsung hit with $1 billion damages

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: