Search This Blog

Friday, February 08, 2013

IRS steps up challenging identity theft battle

Juniper bolsters security assets with $10M buyout of anti-DDoS firm | Security standards council cuts through PCI cloud confusion

Network World Security

Forward this to a Friend >>>


IRS steps up challenging identity theft battle
The Internal Revenue Service continues to battle against the rising tide of identity theft saying that it recently completed what it called a massive national sweep targeting 389 suspects in 32 states and Puerto Rico. The IRS Criminal Investigation unit the total number of identity theft investigations to more than 1,460 since the start of the federal 2012 fiscal year on Oct. 1, 2011. Read More


WHITE PAPER: CDW Corporation

A Deep Dive into Virtualization Optimization
This reference guide provides an in-depth look at best practices for improving server virtualization, exploring client virtualization options, blade migration, storage virtualization and WAN optimization techniques. Learn More.

RESOURCE COMPLIMENTS OF: IDG Research

New Survey: Purchase Process of Enterprise Technologies
Tell us about the buying process for enterprise technologies in Network World's Technology Influence Survey! This survey should take about 10 minutes of your time. To thank you, you will have the opportunity to enter a sweepstakes to win a $250 cash prize*! Please be assured your responses are confidential. To participate, click on the link below. *Due to regulations, prize sweepstakes is only open to legal U.S. and Canadian (except Puerto Rico and Quebec) residents, age 18 or older.

Juniper bolsters security assets with $10M buyout of anti-DDoS firm
Juniper Networks has acquired the assets of Webscreen Systems, a developer of distributed denial-of-service (DDoS) mitigation products, from Accumuli of the United Kingdom. Read More

Security standards council cuts through PCI cloud confusion
Can you hold Payment Card Information (PCI) data in a cloud-based service? Yes, but doing so isn't straightforward, so the PCI Security Standards Council has published a guideline that clarifies what approaches compliance-minded businesses can take. Read More


WHITE PAPER: HP, Microsoft & Intel

Big Data Requires a Remodeling of the Data Warehouse
Take a few moments to learn about a data warehouse appliance that is a massively parallel server optimized to run Microsoft's SQL Server that delivers enterprise scalability, ease of maintenance, and a single version of the truth, all for a low cost. Read Now!

US military needs hackers like Gary McKinnon, says policy analyst
The US Government should consider pardoning Gary McKinnon as part of a campaign to woo people with similar much-needed cyber-skills, influential defence analyst John Arquilla has argued in an article that will make tough reading for the men and women who spent a decade trying to extradite the Briton. Read More

How joining Google Gmail with encryption system helps high-tech firm meet government security rules
When a relatively small high-tech company with some big aerospace and defense customers wanted to adopt cloud-based email for its employees, it faced the challenge that whatever choice of cloud service it adopted, it had to meet the government's security regulations known as ITAR, or the "International Traffic in Arms Regulations." Read More


WHITE PAPER: Riverbed

Optimizing Hybrid Networks for SaaS
With the delay and packet loss associated with the Internet and private WANs, SaaS-based applications tend to exhibit erratic performance that can become a barrier to SaaS adoption. Learn more.

25 techie Valentine's Day gift ideas
From subtle geekery to blatantly techie devices, Valentine's Day gifts suit a range of personalities Read More

Barracuda Networks takes further steps to close backdoor access to its network gear
Barracuda Networks released a new update on Monday to further mitigate a security issue that could have allowed attackers to gain unauthorized access to some of its network security appliances through backdoor accounts originally intended for remote support. The company apologized to customers for its design decisions that led to this situation and promised to look into additional ways to strengthen the remote support functionality. Read More



SLIDESHOWS

2013's 25 Geekiest 25th Anniversaries

A look back at the most memorable tech-related happenings of 1988.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. A giant radio telescope, a small school and Wi-Fi problem

2. Can close source software transition to the GPL successfully?

3. Researchers devise new attack techniques against SSL

4. Hypervisor startup is virtualizing virtualization

5. Which Linux distro is best? Survey says: Slackware

6. iPhoneys: The iPhone 6 and iPhone 5S edition

7. What's up with VMware?

8. Android Trojan infects smartphone to launch attack on PC

9. Microsoft Surface Pro: First look

10. Samsung Galaxy S 4 buzz still white hot


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: