Search This Blog

Tuesday, April 02, 2013

How valuable are security certifications today?

  Defining Big Data Security Analytics | Ransomware leverages victims' browser histories for increased credibility
 
  Network World Security

Forward this to a Friend >>>


How valuable are security certifications today?
When it comes to education, most people agree, more is better. No one embodies that principle -- at least in regard to IT certifications -- better than Jerry Irvine. CIO of IT consulting firm Prescient Solutions and member of the National Cyber Security Task Force, Irvine holds more than 20 IT certifications, of which at least six are specifically information security-oriented. Read More


WHITE PAPER: Trusteer

Dealing with Advanced and Targeted Attacks
This whitepaper explains how advanced malware challenges traditional defenses to take advantage of the increased exposure of employee endpoints. It reviews the evolution of advanced targeted attacks and the various approaches used to address them. Learn More.

WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

Defining Big Data Security Analytics
At the end of 2012, ESG conducted a research project looking at big data security analytics from the demand-side. It turns out that market demand is already apparent -- 44% of enterprise organizations consider their security analytics "big data" today, while another 44% believe that their security analytics requirements will be regarded as "big data" within the next two years. Read More

Ransomware leverages victims' browser histories for increased credibility
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher. Read More

A conversation with Ken Xie the CEO of Fortinet
1. So why don't you tell us where you think the markets are at with security and EPS to start and then, do you still see growth? You can also include your other products. Read More


WHITE PAPER: Dell

Rapid Virtualization Deployment for Private Clouds
Effective private cloud deployment requires a virtualized environment that facilitates easy management of workloads, efficient creation and migration of virtual machines, and rapid delivery of services. Learn More

How to keep 'work from home' employees accountable--without spying
I've been a part-time, work-from-home employee for years now. And yes, I do work. A lot. Still, I hear whispers from coworkers who wonder if I'm just avoiding a commute to spend quality time with my laundry. And then there are the moms I meet at the park on my day off--the ones who say they love "working from home" (complete with air quotes) because it "gives me so much free time." Read More

F-Secure & Kaspersky April Fools' Security: From huge hack to malware written by aliens
You know the web is saturated with pranks to celebrate April Fools' Day, and you expect it from Google and ThinkGeek, but this year F-Secure and Kaspersky dabbled in the fun. F-Secure: Hackers change 3 million passwords Mikko Hypponen, CRO at F-Secure, wrote: Read More

Hired guns suspected in South Korean cyberattacks
The people behind both attacks were just doing their job because of the backdoor file's directory path, Symantec believes Read More


WHITE PAPER: CA Technologies

Making Your Investment in an Executive Dashboard Count
Get insights into what your peers are seeking in Executive Dashboards along with the reasons these dashboards are most effective in achieving value. Learn More

Health Information Exchange Critical But Suffers From Complications
Efforts to expedite the adoption of health information exchange in the United States face a bevy of technology, management and financial questions. There are no easy answers, since HIE organizations are as different as the regions, the populations and the healthcare providers they represent. But there are some lessons to be learned. Read More

It's in the algorithm: Extremely tight races in Major League Baseball chase this year
Perhaps not surprisingly parity is coming to Major League Baseball this season if you believe the mathematical analysis of a researcher at New Jersey's science and technology university, NJIT. Read More

Air Force exploring systems that safeguard spacecraft network security
How are all manner of spacecraft development from the space parts supply chain to actual space operations protected from those who would try to penetrate or disrupt the networks involved in that process? Read More

 
 
 

SLIDESHOWS

Best tools for social media analytics

How to tell if your Facebook, Twitter and LinkedIn efforts are paying off.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Google's famous follies

2. The night Steve Jobs returned to Apple

3. China slams U.S. for discriminating against nation's tech vendors

9. Windows 8: How to solve the Start Button dilemma

5. Critical denial-of-service flaw in BIND software puts DNS servers at risk

6. Avaya willing to share customers with Cisco, Microsoft

7. iPhone 6 rumor rollup for the week ending March 29

8. Geekiest/techiest Easter Eggs

10. 10 geeky and foolish ways to celebrate April Fools' day

4. Cisco lays off 500 of workforce

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: