Search This Blog

Thursday, January 16, 2014

Cisco offers advice on Target breach

Massive denial-of-service attacks pick up steam, new nefarious techniques | An Overview of Malware Protection Techniques

Network World Security

Forward this to a Friend >>>


Cisco offers advice on Target breach
In the wake of the Target and Neiman Marcus data breaches, Cisco suggests encryption at the point-of-sale terminal. Read More


WHITE PAPER: SAP

Get Started with SAP HANA ebook
This ebook introduces the SAP HANA in-memory computing platform and describes how it can transform your business. SAP HANA provides standard offerings to help with a range of business issues and can be incorporated into your current infrastructure, with preconfigured software, content and business-user enablement. Learn more

WHITE PAPER: 8x8, Inc

When Disaster Strikes, Can the Cloud Save Your Business?
Find out why the survivors of Hurricane Sandy and other recent calamities say they wish they'd had cloud-based business VoIP communications, rather than "the vulnerability and limitations of the premises-based communications we had in place." Learn more >>

Massive denial-of-service attacks pick up steam, new nefarious techniques
Several online gaming sites were recently hit by distributed denial-of-service (DDoS) attacks that used a new type of assault on the victims: a Network Time Protocol Amplification Attack. Read More

An Overview of Malware Protection Techniques
It should come as no surprise that nowadays malware has become big business. Bad actors are increasingly better funded and improving their approaches for attacking us. We have reached the point where hacking has become industrialized. As vendors develop solutions, attackers continue to innovate. Read More

Six tips for BYOD Security from IBM
The folks over at the IBM midmarket team have come up with a good slideshow with 6 tips to better BYOD. First let's look at the list and then we can dive in and add some more: 1. Apply mobile device management software 2. Rethink your perimeter strategy Read More

How to make 96,000lbs of WWII machinery into high-tech research platform
The US Naval Research Laboratory is taking a 96,000-pound piece of World War II-era machinery and turning it into a test-bed for leading edge communications and radar applications. Read More


WHITE PAPER: Ipanema Technologies

Achieve Guaranteed MS Lync Performance
Learn how Gemalto, a world leader in digital security employing over 10,000 professionals in 43 different countries, was able to reduce telecom and IT costs while offering their clients a unified communication solution that delivers excellent performance, visibility, and user experience. Learn more >>

Spammers target Google hospitality listings
Spammers targeted hospitality-related business listings on Google services, modifying links in what appeared to be an attempt to drive traffic to a hotel bookings site. Read More

10 ways to prep for -- and ace -- a security job interview
IT security pros with the right skills are in big demand. Last year, the employment rate for information security managers averaged .9%, as we reported in High CISO employment rates means shortage for security industry. That's as close to actual full employment as one can get. Read More

New Blackphone promises secure communications and privacy
Playing on mobile users' fears of commercial and government surveillance, two companies are building a phone they say is designed to protect privacy. The joint venture between smartphone manufacturer Geeksphone and encrypted communications provider Silent Circle will unveil the new device called Blackphone at the Mobile World Congress show in Barcelona next month. Read More

Nest owners: Did you drink the Google Kool-Aid or are you concerned about privacy?
You likely had to be under a rock to not know about Google's plan to pay $3.2 billion for Nest Labs, which makes smart internet-connected thermostats and smoke alarms. Read More


WHITE PAPER: Dell and Oracle

Oracle Database Backup and Recovery Using Dell Storage
This technical whitepaper describes how Dell storage snapshots can be used to offload the Oracle RMAN backups from the production host to backup server thereby reducing the performance impact on the production database. Read now>>

Apple will pay out $32.5M to settle FTC iTunes complaints
Apple today agreed to pay $32.5 million to settle complaints the Federal Trade Commission said the company billed consumers for millions of dollars of charges incurred by children in kids' mobile apps without their parents' consent. Read More

Full-time IT job security increasingly wobbly
The decision by the Texas Department of Transportation last June to outsource IT operations fits squarely into an IT job pattern that dominated last year. Read More

SD cards are hackable, but probably not on a mass scale
All threats are not equally threatening. Read More

Franken presses Ford on location data collection practices
A U.S. Senator Tuesday pressed Ford for information on its in-car data collection practices, citing recent boasts by an executive at the automaker that it can monitor drivers via integrated navigation system. Read More


SLIDESHOWS

The worst data breach incidents of 2013

These businesses and government agencies lost the most personal and financial records due to hackers or security mishaps last year.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Chrome 32: First look

2. SDN will never happen, says VMware exec

3. Juniper should reevaluate switching, security products investor says

4. Massive denial-of-service attacks pick up steam, new nefarious techniques

5. New Windows 9 rumors confirm the old Windows 9 rumors

6. The mixed fate of Sun tech under Oracle

7. Appeals court strikes down FCC's net neutrality rules

8. Galaxy S5 rumors point to plenty of options from Samsung

9. 8 ways that Chrome may be challenging Windows

10. The world's coolest, greenest data centers


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: