Search This Blog

Friday, May 03, 2013

Companies explore self-detonating data as security control

Security response over security prevention? Fiddlesticks! | Video: Security Threat Landscape - May 2013

Network World Security

Forward this to a Friend >>>


Companies explore self-detonating data as security control
The popular Snapchat photo-messaging app used mainly by Android and iOS mobile device owners to share images that then self-destruct after 10 seconds is the sort of security idea that businesses say can help them secure online transactions with business partners. Read More


WHITE PAPER: Riverbed Technology

Case Study: Boston College
Read this case study to learn how Boston College has reduced complexity of the backup process for over 1,700 seats by centralizing management. Read now

WHITE PAPER: Tripwire

SANS Secure Configuration Management Demystified
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall security posture. Learn More

Security response over security prevention? Fiddlesticks!
There is a school of thought very popular in the information security industry today that says attacks and breaches are going to happen. We need to do more to plan our responses for when these happen than in continuing to throw resources at trying to prevent these attacks. Jason Brvenik, VP of Security Strategy at Sourcefire responds, fiddlesticks! Read More

Video: Security Threat Landscape - May 2013
Here's the latest Security Threat Landscape security video podcast, a joint venture between Network World and Fortinet. Join Keith Shaw and Fortinet's Derek Manky as they discuss the latest computer security threats in the world today. This month: Derek discusses fallout from the Twitter hack against the Associated Press, offers up details from the Spamhaus DDOS arrests (including a description of... Read More

Facebook 'Trusted Contacts' lets you pester friends to recover account access
Facebook Thursday said it's making available globally a feature called "Trusted Contacts" that lets users select three to five friends who can help users recover account access such as if they forget their password. Read More


WHITE PAPER: Salesforce.com

Engaging Customers in the Social Era
Many top companies now know that social media is a powerful way to listen to their customers. The most successful service teams today are not only monitoring social, they're actively participating in the conversation. Learn how to proactively engage with your customers through social channels. Learn More Now!

'Content spoofing' a major website vulnerability, study finds
A close look at vulnerabilities in about 15,000 websites found 86% had at least one serious hole that hackers could exploit, and "content spoofing" was the most prevalent vulnerability, identified in over half of the sites, according to WhiteHat Security's annual study published today. Read More

Dutch bill seeks to give law enforcement hacking powers
The Dutch government today presented a draft bill that aims to give law enforcement the power to hack into computer systems -- including those located in foreign countires -- to do research, gather and copy evidence or block access to certain data. Read More

Despite hack, security experts urge no fear of Google Glass
The security risk Google Glass poses to companies is no greater than smartphones or other technology that someone could use to secretly record video and snap pictures, experts say. Read More


WHITE PAPER: Tripwire

10 Steps to Risk-based Security Management
Many professionals in information security espouse the belief—and commitment to—"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Learn More

D-Link publishes beta patches for IP camera vulnerabilities
D-Link has published beta patches for vulnerabilities in the firmware of many of its IP surveillance cameras, which could allow a hacker to intercept a video stream. Read More

Use Net Uptime Monitor to help diagnose Internet problems
As I documented last week, I've been having intermittent problems with my Internet connection. Just when I thought I'd solved it, I woke up this morning to yet another massive slowdown. Read More

12 APIs every programmer should know about
These emerging and under-the-radar APIs add sizzle to your website, from geographical data to financial insights to content analysis Read More

U.S. Department of Labor website infected with malware
A subdomain of a U.S. Department of Labor website appeared offline on Wednesday after an apparent hack that looks similar to a known China-based hacking campaign nicknamed DeepPanda. Read More



SLIDESHOWS

CEO pay

Median pay for tech CEOs in 2012 was $10.7 million, according to Network World's analysis of CEO compensation in the tech industry.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPad 5 rumor rollup for the week ending May 1

2. Arista heading off Cisco/Insieme at 100G SDNs?

3. What BlackBerry CEO Heins actually said about tablets

10. Microsoft's new idea to steal Android users is a good one

9. Aging networking protocols abused in DDoS attacks

6. Carnegie Mellon develops wee QWERTY texting technology for impossibly tiny devices

5. 2013 National Inventors Hall of Fame inductees: From DSL to Dummies

4. IBM premiers world's smallest movie -- starring 10,000 atoms

7. Greatest comebacks in tech history

8. Apache server ambushed by sophisticated backdoor attacks


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: