Search This Blog

Thursday, April 11, 2013

The worst data breaches (so far)

  Gartner: Long hard climb to high level of cloud computing security | Navy CIO: Use the cloud, but be careful
 
  Network World Security

Forward this to a Friend >>>


The worst data breaches (so far)
It's early but it has been a bad year for personal data exposure already Read More


WHITE PAPER: Trusteer

Dealing with Advanced and Targeted Attacks
This whitepaper explains how advanced malware challenges traditional defenses to take advantage of the increased exposure of employee endpoints. It reviews the evolution of advanced targeted attacks and the various approaches used to address them. Learn More.

WHITE PAPER: EMC Corporation

Data Protection Visibility with EMC Data Protection Advisor
With better visibility and insight into a key service delivery area like backup, data protection providers can get better information with less effort—and their clients are the beneficiaries. Learn More

Gartner: Long hard climb to high level of cloud computing security
It's still a long, hard climb to get to a high level of security in cloud computing, according to Gartner research vice president Jay Heiser, who said business and government organizations with sensitive data appear likely to hold back from cloud-based services until things improve. Read More

Navy CIO: Use the cloud, but be careful
The U.S. Navy's CIO has directed that Naval information systems be migrated to commercial cloud service providers, but only for information that has already been approved for public release. Read More


WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

Vudu video service resets customer passwords after hard drives theft
Walmart's video service Vudu has reset its customers' passwords after it found that hard drives were among items stolen from its office. Read More

"Fantastic Voyage" microrocket technology coming to a body near you -- maybe yours
In the 1966 science fiction classic "Fantastic Voyage," a tiny submarine with a crew of five is miniaturized and injected into a comatose man to surgically laser a blood clot in his brain and save his life. At this week's American Chemical Society Nanoengineering expert Joseph Wang detailed his latest work in developing micromotors and microrockets that are so small that thousands would fit inside... Read More


WHITE PAPER: HP

Best Practices for Secure Software Development
As part of the software development process, security professionals must make choices about where to invest their budget and staff resources to ensure that homegrown applications are as secure as possible. This research brief details these best practices for all organizations that would like to produce more secure applications. Learn more.

iOS VPNs and portable storage for Apple devices
First up, serious networking stuff concerning Apple and how iOS supports VPNs and how it won't in future. Read More

Hackers turn a Canon EOS camera into a remote surveillance tool
The high-end Canon EOS-1D X camera can be hacked for use as a remote surveillance tool, with images remotely downloaded, erased and uploaded, a researcher said during the Hack in the Box security conference in Amsterdam on Wednesday. Read More

Spam botnet-for-hire used to deliver Android malware
The world's largest spam botnet has recently been found sending bogus email with links to the Stels Android Trojan, an indication that the malware business on mobile devices is leaving startup mode. Read More

 
 
 

SLIDESHOWS

Top 10 cloud tools

New tools help IT execs cut cloud costs, optimize resources, integrate and manage cloud instances.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. EFF urges court to protect privacy of text messages

2. The worst data breaches (so far)

3. Skepticism follows Cisco-IBM led OpenDaylight SDN consortium

10. Novell president plots company's return

9. Father of SSH working on new version of crypto standard

6. Windows 8: How to solve the Start Button dilemma

5. EMC teams with Avaya (not Cisco) on communication pods

4. Former switching chief McCool leaves Cisco

7. Network heavy hitters to pool SDN efforts in OpenDaylight project

8. Security and vulnerability assessment: 4 common mistakes

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: