Search This Blog

Wednesday, May 08, 2013

Florida’s identify-theft rate towers over lower 49

  Security pros cheer hint of hands-off updates in Windows Blue | Cyberattack highlights software update problem in large organizations
 
  Network World Security

Forward this to a Friend >>>


Florida's identify-theft rate towers over lower 49
Sure, the headline gives away the answer, but if you had been asked to guess which state has the highest rate of reported identity theft you'd likely have chosen Florida: A large population of vulnerable retirees and a generally high crime rate all but guarantee the distinction. What might surprise you, however - and what shocked me -- is the magnitude of Florida's "lead" over the other 49 states.... Read More


WEBCAST: Meru Networks

Advanced WLAN Architectures for BYOD and Beyond
Join industry - expert Craig Mathias and Robert Crisp from Meru Networks as they discuss today's key IT challenges View Now

WHITE PAPER: Tripwire

SANS Secure Configuration Management Demystified
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall security posture. Learn More

Security pros cheer hint of hands-off updates in Windows Blue
Microsoft's apparent plan to automatically update its own Windows Store apps in the next version of Windows 8 is drawing praise from security experts. Read More

Cyberattack highlights software update problem in large organizations
A recent cyberattack targeting U.S. government employees working with nuclear weapons illustrates the vulnerability of large organizations that struggle with deploying protective software upgrades. Read More


WHITE PAPER: F5

Top Considerations When Choosing an ADC
Because of its strategic location in the data center network, the selection of an Application Delivery Controller requires careful consideration of both functional and financial factors. This paper explores important elements to evaluate, including network performance, availability and security. Learn More.

The science of app-wrapping
BYOD brings out the classic problem between control of corporate information and individual freedom. It kicks it up to a whole new level because the devices belong to the users, but at least some of the apps and information belong to the company and as such need protection and policy enforcement. Read More

Google left heating, cooling system open to hackers
Hackers could have turned up the heat in one of Google's offices in Sydney. Literally. Read More


WHITE PAPER: Tripwire

10 Steps to Risk-based Security Management
Many professionals in information security espouse the belief—and commitment to—"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Learn More

Pentagon accuses China government, military of cyberattacks
China's government and military appear to be directly involved in cyberattacks against the U.S., according to a report released Monday by the U.S. Department of Defense. Read More

Chinese 'Comment Crew' hackers emptied QinetiQ of top-secret military data
One of the US's critical military and espionage contractors QinetiQ North America (QNA) was successfully pillaged for huge amounts of top-secret know-how by the infamous Chinese 'Comment Crew' or PLA 61398 hacking group in a campaign stretching over years, Bloomberg has reported. Read More

Hottest products from Interop 2013
Interop 2013, one of the biggest networking shows each year, is here and the product announcements are plentiful Read More

How to keep your network humming
Argent wins test of 6 midrange network management tools Read More

 
 
 

SLIDESHOWS

Hottest products from Interop 2013

Interop 2013, one of the biggest networking shows each year, is here and the product announcements are plentiful.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Steve Jobs ordered Apple ads off Fox News

2. Hottest products from Interop 2013

3. Juniper closer to Cisco in shipping SDN brains

10. Microsoft confirms zero-day vulnerability exploiting IE8

9. SNL shatters Google Glass

6. How Facebook aims to reinvent hardware

5. FAQ: What you need to know about cloud computing's hidden tax hit

4. The Onion Twitter account hacked by Syrian Electronic Army

7. Veteran tech workers see themselves locked out of job market

8. Windows 8 update: Gates: Windows 8 is about the iPad

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: