Search This Blog

Wednesday, May 15, 2013

View from inside Verizon's security SWAT team

  FBI/IC3: Impersonation, intimidation and scams, yep that's the Internet | 7 steps to securing Java
 
  Network World Security

Forward this to a Friend >>>


View from inside Verizon's security SWAT team
Bryan Sartin is director of Verizon's RISK Team, the communications provider's computer forensics practice, which is also the group that helps create the annual Data Breach Investigations Report (DBIR). Network World Editor in Chief John Dix caught up with Sartin to learn more about the RISK Team, get his take on the state of enterprise security, and discuss new findings from the recently published DBIR report.
 Read More


WHITE PAPER: F5

Vital Security Strategies for Microsoft Exchange
The demand for access to email anytime, anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn about vital security requirements every Exchange environment should have in place to improve security and availability for Exchange. Read Now.

WHITE PAPER: Raritan Inc

The Distributed Enterprise: Remote Access and IT Management
For IT managers, remote offices can cause any number of headaches. Fortunately, Raritan offers solutions to help manage remote office control, security and budgetary issues. This white paper examines and analyzes the increases in uptime and security provided by out-of-band access and control tools. Learn more.

FBI/IC3: Impersonation, intimidation and scams, yep that's the Internet
The FBI and Internet Crime Complaint Center (IC3) issued their annual look at the state of the dark side of the Internet which is indeed thriving with all manner of scams and intimation tactics being used by criminals. [RELATED: An inside look at the fraud blight] Read More

INSIDER
7 steps to securing Java
Java, the popular OS-independent platform and programming language, runs on just about every kind of electronic device imaginable, including computers, cell phones, printers, TVs, DVDs, home security systems, automated teller machines, navigation systems, games and medical devices. Read More

Online gaming company recounts fighting for survival vs. DDoS attacks
Fighting denial-of-service attacks has become a matter of survival for some businesses that find their websites getting smashed and network flooded by attackers. Online gaming company SG Interactive says it's under constant attack and the only way to keep going is to set up an anti-DDoS defense. Read More


WHITE PAPER: F5 Networks

Considerations for Combating Modern Threats
Download this White paper to learn how a new datacenter architecture based on F5's Application Delivery Firewall combats modern attacks while reducing capex. Learn More

Microsoft commits to secure coding standard
Microsoft says its coding practices and its corporate management structure both comply with an international application security standard to encourage secure software development. Read More

When HIPAA is too hard for health care, Health Security Solutions
Health care today is a complicated business. Staying on top of the latest medical developments, treatments and technology is a full-time job. Working within the insurance company business process so you can get paid is yet another world unto itself. Running a business trying to keep people healthy (that is the goal right?) is hard enough. Read More

Intel's McAfee brings biometric authentication to cloud storage
Intel is introducing new ideas to secure the public cloud, offering a service in which online files can be accessed after users are verified by an authentication scheme including face and voice recognition. Read More


WHITE PAPER: IBM

Security First Insurance
Using IBM Content Analytics and ECM software, the insurer enhances service to policyholders no matter which channels they use to get in touch. Learn More.

Western Union, eh, phisher person?
The ever-vigilant IT department here at Network World just issued a warning to be on the lookout for phishing email purporting to be from Western Union. Western Union? What? I'm going to fall for the old "You've got a telegram" ruse? (The email was indeed in my inbox.) I kid, of course, because we all remember that Western Union transacted its final telegram back in 2006. From an Associated Press... Read More

Q&A: Nick Carr on 10th anniversary of 'IT Doesn't Matter'
Nick Carr rocked the tech world with his controversial essay in the May 2003 issue of the Harvard Business Review, titled "IT Doesn't Matter." Carr claimed companies were overspending on IT and that the competitive advantage to be gained by tech investments was shrinking as technology became more commoditized and accessible to everyone. On the 10-year anniversary of the article's publication, Carr talked with Network World's Ann Bednarz about what he got right, what he got wrong, and how the piece remains relevant today. Read More

McAfee rethinks consumer security service delivery
McAfee, part of Intel, today announced a profound shift in how it distributes and prices its consumer security products by introducing LiveSafe, a service that combines anti-malware plus a score of other capabilities, such as anti-theft protection and a so-called "safety deposit box" in the cloud that can only be accessed by means of the user's face or voice biometric. Read More

 
 
 

SLIDESHOWS

Sun's stars: Where are they now?

One of the brightest lights in Silicon Valley for more than two decades.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Verizon Enterprise chief: We're headed for cloud computing's A-list

2. Comedian Rob Schneider stars as Google Docs in Microsoft Office 365 video

3. New York calls on phone makers to help deter theft

10. 100G, SDN leaving older switches behind

9. iTunes: Still slowing down Windows PCs after all these years

6. Understanding Software Defined Networking

5. iPhone rumor rollup for the week ending May 10

4. 12 iPhone apps that will make you a networking star

7. Networks in 2020: More traffic, less energy

8. McAfee rethinks consumer security service delivery

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: