Search This Blog

Wednesday, October 16, 2013

First Look: NetCitadel threat management platform in beta site

The Key to Big Data Security Analytics Solutions: Algorithms, Visualization, Context, and Automation (AVCA) | Insider threats and how they can be mitigated

Network World Security

Forward this to a Friend >>>


First Look: NetCitadel threat management platform in beta site
Detecting and stopping stealthy malware designed to steal sensitive information means moving fast. Start-up NetCitadel wants to put its new Threat Management Platform in the middle of the security-response game with many of the other players there now -- sandboxing, firewalling, and other technologies a company may use in order to provide a kind of orchestration and decision-making point. Read More


RESOURCE COMPLIMENTS OF: NeuStar

Hoping for answers on DDoS? Want to hear proven strategies?
Knowing is half the battle. Learn from experts in: • Government • Industry • Research & analysis Join us for DDoS Awareness Day From Hope to Strategy A live virtual event hosted by Neustar, sponsored by CSO │October 23, 2013 Register to Reserve Your Space Now

WHITE PAPER: PC Connection

5 Steps for Building a Secure Cloud
The cloud promises impressive gains in infrastructure agility, efficiency, and cost reduction, but the greatest barrier to cloud adoption continues to be security. Read this white paper to learn best practices for keeping your data and your organization safe. Learn More

The Key to Big Data Security Analytics Solutions: Algorithms, Visualization, Context, and Automation (AVCA)
ESG research indicates that 44% of organizations believe that their current level of security data collection and analysis could be classified as "big data," while another 44% believe that their security data collection and analysis will be classified as "big data" within the next two years (note: In this case, big data security analytics is defined as, "security data sets that grow so large... Read More

Insider threats and how they can be mitigated
Any employee with access to sensitive data is a potential threat, whether they know it or not. Even if they don't have malicious intentions, the inherent nature of their privilege is what makes them so dangerous. Read More

Chris Hemsworth goes to 'nerd school' for hacking in cyber-terrorism thriller 'Cyber'
The idea of American and Chinese military forces working together on "a case of high-level computer hacking" may be a bit mind-boggling, being that the two countries are more-or-less sworn cyber-enemies intent on hacking each other for cyber espionage, but it is the premise for the upcoming Michael Mann cyber-thriller dubbed "Cyber." That's not the type of thing I normally follow, but the purported Read More


WHITE PAPER: Akamai Technologies, Inc.

Develop an Effective DDoS Mitigation Strategy
To lower your organization's exposure to increasing web-based attacks, you need an effective DDoS Mitigation strategy. Download this Forrester Research report to learn how a two-phased approach to protecting your websites and applications can lower your risk. Learn More

Yes, indeed, Yahoo has that Y3K problem under control
As a regular user of Yahoo! Fantasy Sports, I would like to thank the company's developers for their diligence and foresight as displayed in their most recent software release, version 5.3.1. Oh, sure, they could have procrastinated until the very last minute, which - according to this handy countdown clock - won't be for a spell yet. Read More

Changeable default passwords are not seen as vulnerabilities by ICS-CERT, but should they be?
While responding to a vulnerability report submitted in April, ICS-CERT told a researcher that documented, changeable default passwords are not vulnerabilities. But given the risk behind default passwords and the focus on critical infrastructure security, shouldn't such things be considered an issue? Read More

What the Internet of Things means for security
You've probably been hearing a lot lately about the Internet of Things (IoT). The IoT (see: "The IoT: A Primer" at the end of this piece), while still in the early stages of development, is slowly making its way into the mainstream as more objects become connected via technology such as radio frequency identification (RFID) and the iniquitousness of the Internet. Read More


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Security vendor admits mistake in website take down
Rapid7 has acknowledged that it waited too long to take the security actions needed to prevent a pro-Palestine hacking group from taking down two of its websites by sending a fax to the sites' registrar. Read More

ForeScout technology encourages security management info sharing
ForeScout Technologies Tuesday introduced technology that allows other security vendors as well as third parties such as systems integrators to share monitoring and security-related information directly with ForeScout's CounterAct network-access control product. Read More

Lavabit briefly allowing users to recover their data
Former users of the Lavabit encrypted email service that was shut down in August are being temporarily allowed to change their passwords and download copies of their data. Read More

Experts recommend safeguards with Chrome personal data store
Google Chrome users should take extra precautions when using the browser to type personal data, such as credit card numbers, into website forms, experts say. Read More


SLIDESHOWS

8 most interesting tech gadgets of 2013

Here's a list of the eight most significant tech gadgets released to date. These aren't necessarily the best selling or most popular, but each stands out for one reason or another.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 8 most interesting tech gadgets of 2013

2. Worst data breaches of 2013 (part 3!)

3. How Microsoft invented, or invisibly runs, almost everything

4. Backdoor found in D-Link router firmware code

5. The Internet is moving away from the U.S.

6. Microsoft ships tool to block IE 11 on Windows 7

7. Gartner: The top 10 IT altering predictions for 2014

8. Obamacare portal suffers from common e-health government disorders

9. VMware acquires Desktone, makes network virtualization generally available

10. Greed is good: 9 open source secrets to making money


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: