Search This Blog

Tuesday, October 08, 2013

Gartner: Top 10 future strategic IT predictions

Study links phishing vulnerabilities to personality traits | AppRiver filters catch 3.5 billion spam emails in August, US largest point of origin

Network World Security

Forward this to a Friend >>>


Gartner: Top 10 future strategic IT predictions
Gartner opened its Symposium/ITxpo extravaganza with a bit of good news: Worldwide IT spending is forecast to reach $3.8 trillion in 2014, a 3.6% increase from 2013. But with that growth there are big changes afoot and as Gartner will, it took a look at what some of the biggest changes - including the impact of 3D printing, automation and security threats -- will mean for anyone involved in IT. Read... Read More


RESOURCE COMPLIMENTS OF: NeuStar

Hoping for answers on DDoS? Want to hear proven strategies?
Knowing is half the battle. Learn from experts in: • Government • Industry • Research & analysis Join us for DDoS Awareness Day From Hope to Strategy A live virtual event hosted by Neustar, sponsored by CSO │October 23, 2013 Register to Reserve Your Space Now

WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Study links phishing vulnerabilities to personality traits
A new report from the Polytechnic Institute of New York University has linked susceptibility to phishing scams to personality traits, noting that women may be more vulnerable to men. Read More

AppRiver filters catch 3.5 billion spam emails in August, US largest point of origin
AppRiver, an email and web security solutions provider, has released its Global Threatscape Report for the month of September, documenting the amount of spam traffic caught by the company's email filters in August of this year. While the report does provide information about specific malware threats -- like the fact that X.UPX.App.pakuberc was the most common malware threat in August based on frequency of appearance in email traffic -- it also offered valuable information about the fluctuation of spam frequency and its countries of origin. Read More

Network Forensics: A Burgeoning Big Data Security Analytics Category
According to ESG research, 49% of enterprise organizations suffered a successful malware attack over the past two years (note: "successful" implies that the malware compromised an IT asset and caused some type of impact such as a system re-imaging, data theft, downtime, etc.). Of these firms, 20% suffered 10 or more successful malware attacks. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Despite risk of aiding hackers, experts favor disclosing vulnerabilities
A recent Microsoft presentation on the ethics of disclosing vulnerabilities before a patch is available sparked a debate Thursday among experts who tended to lean in favor of releasing information sooner than later. Read More

Source code and 2.9 million accounts raided by attackers in Adobe breach
In a blog post on Thursday, Adobe said that during a security audit sometime around September 17, the company discovered that attackers had accessed Adobe customer IDs, as well as encrypted passwords. In addition to IDs and passwords, Adobe Chief Security Officer, Brad Arkin, said that the attackers also accessed customer names, encrypted credit and debit card numbers, expiration dates and "other information." Read More

5 Wi-Fi security myths you must abandon now
Wi-Fi has evolved over the years, and so have the techniques for securing your wireless network. An Internet search could unearth information that's outdated and no longer secure or relevant, or that's simply a myth. Read More


WHITE PAPER: FICO

Deliver Customer Value with Big Data Analytics
Big Data requires that companies adopt a different method in understanding today's consumer. Read this white paper to learn why Big Data is not just another passing trend. Learn more.

Raising awareness quickly: A brief overview on phishing
In a series of posts for National Cyber Security Awareness Month, Rapid7 is releasing a set of easily emailed user awareness notes. With permission, and because we fully support the notion of raising awareness when it comes to security topics, CSO has published the letter below. Read More

Adobe hack shows subscription software vendors lucrative targets
Adobe on Thursday admitted that hackers broke into its network and stole personal information, including an estimated 2.9 million credit cards, illustrating the lucrative target that software-by-subscription providers have become to cyber criminals. Read More

Attention, CISOs: Strategy is the only security
According to the 2013 Chief Information Security Officers survey by the Open Web Application Security Project (OWASP), 75 percent of CISOs responded that external attacks had increased. When asked what the main areas of risk as percentage of the overall risk are, 70 percent of CISOs responded that web applications represent an area of risk higher than network infrastructure. Read More


SLIDESHOWS

The 'Bad Boys' of open source

The open source world's most notorious characters.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 802.11ac 'gigabit Wi-Fi' starts to show potential, limits

2. Hackers steal information on 2.9 million Adobe customers

3. Cisco/Insieme ushering in hardware-defined networks

4. 12 best places to land a tech job

5. Cisco CEO John Chambers' triumphant return to Interop

6. Microsoft to patch zero-day IE bug now under attack

7. Ubuntu impresses in Linux enterprise server test

8. CSC: The cloud's quiet whiz kid

9. SDN pioneers share their secrets

10. 10 people who should have been Apple's Siri


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: