Search This Blog

Tuesday, March 05, 2013

Securing the network beyond passwords

  How Blackstone is finding BYOD success with BYOA(pple) | Starbucks that Steve Jobs prank called still receives mock orders for 4,000 lattes to go
 
  Network World Security

Forward this to a Friend >>>


Securing the network beyond passwords
Passwords have been a weakness of network security since the development of computer networks. Through guessing weak passwords, exploiting weak passwords, acquiring passwords through social engineering, or more recently using malicious software like Advanced Persistent Threats (APT), attackers have focused on compromising passwords to gain access to the network. Read More


RESOURCE COMPLIMENTS OF: Cymphonix

Maintain Network Sanity During March Madness
Streaming, live NCAA basketball. It's coming to your network with a force that will make the rest of your traffic crawl at best and at worst, bring your connection to the Cloud to a complete halt. Unchecked, your network's stability and performance are at risk. Don't leave it to chance. Install an Internet Management device from Cymphonix today. Give us four minutes of your time, and we'll show you how Cymphonix will allow you to completely manage and control all March Madness traffic. Click now to view the video, "Maintain Network Sanity During March Madness."

WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

How Blackstone is finding BYOD success with BYOA(pple)
Bill Murphy, CTO and managing director at Blackstone, a global investment and advisory firm, knew he wanted to find a way to allow employees to use their own devices for work. The demand was there, and he was increasingly hearing about how adding in BYOD would help productivity. Read More

Starbucks that Steve Jobs prank called still receives mock orders for 4,000 lattes to go
In January 2007, Steve Jobs took the stage at Macworld, introduced the iPhone, and forever changed the smartphone landscape. You might remember that he also prank called Starbucks during a demo meant to show how easy the iPhone made it to find nearby coffee shops using Google Maps and call one up. "Yes, I'd like to order 4,000 lattes to go, please. No, just kidding. Wrong number. Goodbye!" Read More

White House urges reversal of ban on cell-phone unlocking
In a dramatic call for action directly prompted by 114,000 signatures on a "We the People" petition, the Obama Administration moments ago pledged to overturn a federal regulatory decision that had rendered the act of unlocking a cell phone illegal. Read More


WHITE PAPER: Egnyte

File Sharing Beyond the Firewall
Learn how to provide local file access outside with any computer or mobile device outside the firewall, without the need for VPN. See why cloud-enabled storage is the next generation of file sharing infrastructure Read Now!

CloudFlare briefly drops off Internet deflecting DDOS attack
CloudFlare's Juniper routers choked on a slight programming change designed to deflect a distributed denial-of-service attack, knocking the company's services off the Internet for about an hour early Sunday morning. Read More

Cybercriminal teen hacked prison mainframe while taking IT course
One of the UK's most skilled and successful convicted cybercriminals was allegedly able to hack into his prison's mainframe after being allowed to take an IT course, an industrial tribunal hearing has heard. Read More

Evernote hit in hacking attack, users must reset their passwords
Evernote, which makes business and consumer productivity software for things like taking notes and doing research, is forcing all of its 50 million users to change their passwords after detecting a hacker intrusion on its sytems. Read More


WHITE PAPER: AccelOps

Operationalizing Information Security ebook
The use of security information and event management (SIEM) as part of an integrated security management program is an information security best practice. Read Now

Digital Certificates Chaos Could Cost Companies $398 Million
Trust. It is the basis of all digital transactions. We trust that our inventory systems are providing the correct information, that the documents we're reading have not been altered, that the entity on the other side of a financial transaction is our bank. Read More

Securing critical infrastructure
During the 2007 housing crisis, Columbus, Ohio--like most municipalities--faced significant tax shortfalls and revenue constraints. Read More

Context-aware application control: A new approach to block endpoint threats that bypass traditional security methods
Corporate endpoints are under attack from cybercriminals who have developed ingenious and effective methods for installing malware on endpoints that can steal control from the end user, and there is no indication these attacks will slow down anytime soon. One reason: popular defensive technologies have provided some protection against the most blatant attacks, but have had little impact against more advanced threats. A new approach to endpoint protection is desperately needed. Read More

Will future surveillance include global 'pre-crime' machine spying on everyone?
What can we expect to see in the future of surveillance? Remember the "precogs" in Minority Report capable of seeing the future to stop crimes before they happened? Now imagine that on a global scale, capable of monitoring all people all the time...that will supposedly be our reality in the next 17 years or less. Read More

 
 
 

SLIDESHOWS

10 tech company social media bloopers

Social media blunders are nothing new, and the technology industry is not immune to them.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Tablet wars: Microsoft Surface RT v. Apple iPad

2. Hackers use corporate attacks as staging grounds for other cyber assaults

3. Cisco looking to make things right with West Virginia

9. 11 fun facts about Apple

4. MIT panel warns of challenges of hyper-networked world

5. Is Yahoo's telework ban shortsighted or savvy? Data says both

6. Can BES 10 save BlackBerry

7. Evernote hit in hacking attack, users must reset their passwords

8. iPhone 6 rumor round up for the week ending March 1

10. Why Android 4.2.2 is an important update

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: