Search This Blog

Friday, February 22, 2013

13 of the biggest security myths busted

  NBC.com hacked to serve up banking malware | How Colorado's CISO is revamping the state's information security -- on a $6,000 budget
 
  Network World Compliance

Forward this to a Friend >>>


13 of the biggest security myths busted
13 myths about information-technology security you'll hear but should you believe? Read More


WHITE PAPER: IBM Corporation

A Guide for a Successful ERP Strategy in the Midmarket
Combining an experienced service partner with an informed ERP strategy helps to maximize ROI. This helps midmarket organizations to contain costs, communicate effectively, and improve to grow into more successful organizations. Learn More.

WEBCAST: CA Technologies

CA APM and CA APM Cloud Monitor
CA Technologies Application Performance Management (CA APM) provides advanced application and infrastructure monitoring to ensure optimal business service performance. Watch this flash demo to see how CA APM enables IT operations and line of business owners to reduce revenue risks and keep customers loyal. Learn More

NBC.com hacked to serve up banking malware
Websites affiliated with U.S. broadcaster NBC were hacked for several hours on Thursday, serving up malicious software intended to steal bank account details. Read More

How Colorado's CISO is revamping the state's information security -- on a $6,000 budget
Before Jonathan Trull took over as Chief Information Security Office for the state of Colorado in 2012, he had already been working in the Colorado Office of the State Auditor for a decade. As the Deputy State Auditor, he was responsible for overseeing annual audits of the state's systems. Read More

Network World's 15 Hottest Tech Arguments
iOS vs. Android, AT&T vs. Verizon LTE, Chrome vs. IE vs. Firefox and more Read More


WHITE PAPER: Silver Peak Systems, Inc.

Claimed Proof-Positive of Network Virtualization's Agility
See what 451 Research thinks of these claims, this new technology and the competition in this analyst report. Learn more.

Jeep joins Burger King on Twitter hacked list, inspires MTV, BET to fake breaches
Hackers touted Cadillacs in Chrysler division's Twitter feed Read More

Meet Mandiant, the company pulling the covers off alleged Chinese hackers
This week's exposing of a cybersecurity threat group linked to China's People's Liberation Army has thrust Mandiant, the source of a self-described "unprecedented report" and a video about the cyber-espionage campaign, into the security spotlight. Read More

Chinese Army link to hack no reason for cyberwar
Finding of China's involvement in recent hacks in U.S not an act of war because it's cyberespionage, says proponent of active defense Read More


WHITE PAPER: Fiberlink Communications

Achieving True Enterprise Mobility
Download MDM Is Only Half the Battle from CITO Research to learn the tenets of effective Mobile Device Management (MDM) and the need for the same conversations to take place around Mobile Application Management. Learn More

Oxford University briefly blocks Google Docs in anti-phishing effort
Blamed 'persistent failures' by Google to stop abuse, but removed block after two hours Read More

Rising cyberthreats set backdrop for latest cybersecurity bill
DHS Secretary Janet Napolitano urges Congress to pass the new legislation, saying it should not wait for a '9/11 in the cyber world' Read More

Dell: We can beat Cisco in enterprise and cloud security
Dell can trump Cisco in the information-technology security market, say Dell's executives in describing how the company with its multifaceted approach will hold an edge against some powerful rivals that also include HP and IBM. Read More

The top 6 jailbreak apps for iOS 6
These tools will help you get the most out of your jailbroken iPhone Read More

INSIDER
Mobile, Analytics Help Sports Industry Score More Sales
Organizations such as the Green Bay Packers football team and the owner of the Daytona 500 race track are using IT to produce happier fans and more revenue. Read More

 
 
 

SLIDESHOWS

13 of the biggest security myths busted

13 myths about information-technology security you'll hear but should you believe?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Notification of .edu server breach mistaken for phishing email

2. First look: Firefox 19

3. Dell: We can beat Cisco in enterprise and cloud security

4. The beginning of the end of BYOD as we know it

5. Petition to legalize cell-phone unlocking tops 100,000 signatures

6. Microsoft Azure overtakes Amazon's cloud in performance test

7. Cisco declares war on Microsoft unified communications system

8. The Samsung Galaxy S 4 shows up in New Zealand, and on an AT&T stat sheet

9. iPhone 6 rumor rollup for the week ending Feb. 15

10. U.S. students get cracking on Chinese malware code

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: