Search This Blog

Thursday, November 08, 2012

Security experts push back at 'Cyber Pearl Harbor' warning

  You + Big Data = Not Anonymous; Microsoft develops Differential Privacy for everyone | How (and why) to surf the Web in secret
 
  Network World Security

Forward this to a Friend >>>


Security experts push back at 'Cyber Pearl Harbor' warning
The nation's top national security leaders have not convinced every expert in the cybersecurity community their warnings over cyberattacks are valid, and there is now some increasingly vocal push-back from some of them. Read More


WEBCAST: Aternity

Strategies for Ensuring Desktop Virtualization SLAs
Desktop Virtualization is the top cloud-based technology impacting End User Computing. And, user-centric, Service Level Agreement (SLA) Management is the primary factor against which cloud-based virtual desktop solutions will be evaluated. Don't let your VDI project get derailed by poor end user experience. Register now.

WHITE PAPER: FireEye

Intensified Dangers of Email-Based Attacks
Keep your organization safe by staying educated. Download this report to learn more about identifying and preventing cyber attacks. Learn more.

You + Big Data = Not Anonymous; Microsoft develops Differential Privacy for everyone
Too often, we hear how researchers can take supposedly anonymized or obfuscated PII (Personally Identifiable Information) data and exploit "linkability threats" to re-identify individuals such as in I know where you are and what you are sharing and deanonymizing you after one mouse click on a website. Read More

How (and why) to surf the Web in secret
They say no one can hear you scream in space, but if you so much as whisper on the Web, you can be tracked by a dozen different organizations and recorded for posterity. Simply visiting a website can allow its operators to figure out your general physical location, identify details about your device information, and install advertising cookies that can track your movements around the web. (Don't believe me? Check this out.) Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Government secrecy around IT failure will undermine its Big Data plans, says PAC chair
Margaret Hodge, chair of the Public Accounts Committee, has called the government's transparency agenda into question by criticising its unwillingness to publish data about struggling IT projects, which in turn undermines its plans for taking advantage of big data. Read More

How to properly use a load balancer in Cisco's Identity Services Engine
So, this is my first blog post on here. Hope it goes well. One of the most commonly asked questions of late is how to properly use a load-balancer with Cisco's Identity Services Engine. Here are some basic guidelines to use when configuring a Load Balancer for the ISE Policy Services Nodes (PSNs). Read More


WEBCAST: Fluke Networks

Solve QoS Problems in VoIP Call Centers
View this short video "Maintaining High VoIP Quality for Call/Contact Centers with Network Time Machine", to learn more about how carrier and call center customers are using Network Time Machine to rapidly determine problem domain and identify choke points in the network. View Now!

Sandy wounded servers, some grievously, say services firms
Companies that specialize in data recovery are still getting many calls for help from businesses and institutions whose equipment was damaged by the effects of Hurricane Sandy. Read More

Are lawyers getting in the way of cloud-based security?
In an age where enterprises and their employees are being relentlessly targeted with malware-based phishing, denial-of-service and other attacks, the ability of the IT security staff to defend their networks and valuable corporate data faces yet one more obstacle, according to some: their own company lawyers. Read More

2013 IT salaries: 15 titles getting the biggest pay raises
Mobile application developers and wireless network engineers can expect a 9% and 7.9% increase in starting salaries, respectively, says recruiting and staffing specialist Robert Half Technology. Read More

Adobe, now 'married' to Microsoft, moves Flash updates to Patch Tuesday
Adobe on Tuesday announced that it will pair future security updates for its popular Flash Player with Microsoft's Patch Tuesday schedule. Read More

 
 
 

SLIDESHOWS

15 people who said no to Facebook
Here are 15 people who have declined an opportunity with the social networking giant.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Teen CEO launches storage startup; catches Facebook's eye
  2. Machines alter election votes: Hacking voting machines so easy that Grandma can do it
  3. Microsoft DRM technology will take a head count, check ID
  4. 15 people who said no to Facebook
  5. The Apple family tree: Apple platforms through the years
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. .xxx to launch porn search engine
  8. iPhone 6 rumor rollup for week ending Oct. 26
  9. AT&T to pay $700,000, refund overcharged customers
  10. Microsoft Trustworthy Computing finally pays off in a big way
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: