Search This Blog

Wednesday, March 19, 2014

20 infamous hacker security vendor break-ins

12 hot security start-ups you need to know | Can data lakes solve cloud security challenges?

Network World Security

Forward this to a Friend >>>


20 infamous hacker security vendor break-ins
Here are 20 of the most notorious known break-ins over the past decade. Read More


RESOURCE COMPLIMENTS OF: SolarWinds

Tales from the Dark Side of the Network
Frustrated with your big IT Network Management System? In this exclusive footage, IT pros tell their side of the story...the dark side. Let SolarWinds ® Software bring light to the darkness. Save Time. Save Money. Save the Network with SolarWinds Network Performance Monitor. Watch now and don't let inefficient network management systems take your team to the dark side.

WHITE PAPER: IBM

Pay-as-you-Grow Data Protection
IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions they need, and add new functionalities as they grow. Read Now

12 hot security start-ups you need to know
The willingness to invest in new security start-ups is continuing at such a breakneck pace that start-ups still in stealth mode are getting snapped up by more established players before they even publicly introduce their security products and services. Read More

Can data lakes solve cloud security challenges?
"Data Lake" is a proprietary term. "We have built a series of big data platforms that enable clients to inject any type of data and to secure access to individual elements of data inside the platform. We call that architecture the data lake," says Peter Guerra, Principal, Booze, Allen, Hamilton. Yet, these methods are not exclusive to Booze, Allen, Hamilton. Read More

BYOD is fraught with legal peril, audience told
Businesses worry most about security when it comes to bring-your-own-device programs, but the legal ramifications of letting employees use personal smartphones and tablets at work can be just as threatening, attendees of Enterprise Connect were told. Read More


WHITE PAPER: HP

Building a Better Network Strategy
In today's global, always-on world, network security is crucial. This Slashdot Pulse offers insight into IT professionals who currently manage network security, giving readers a glimpse into real-word security plans and tactics. Learn More>>

Proprietary firmware poses a security threat, Ubuntu founder says
Mark Shuttleworth, the founder of the popular Ubuntu Linux distribution, believes proprietary firmware and unverifiable firmware code poses a serious security threat to users and encourages hardware manufacturers to implement support for their innovations through the Linux kernel instead. Read More

13 cool high-tech prize competitions
NASA, DARPA, IBM and others offer prize money for your time and expertise Read More

Hopped-up Helicopters: DARPA funds radically faster, stronger aircraft
The Defense Advanced Research Projects Agency today embarked on it plan to build a super vertical take off and landing or VTOL aircraft that can fly fast and carry a big load. Read More


WHITE PAPER: HP

8 Ways To Monitor Network Security in the Age of BYOD
This SlashGuide offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce. Learn More>>

Experts warn against judging Firefox on poor Pwn2Own performance
Mozilla Firefox was the loser in this year's Pwn2Own hackfest, but experts warn against placing too much importance on the number of zero-day vulnerabilities found in the Web browser. Read More

4 Lessons CIOs Can Learn From the Target Breach
Retail giant Target made headlines after announcing that 110 million Americans were affected by a massive data breach at its stores. If you want to avoid the same fate, pay attention to these four lessons learned in the wake of the Target breach. Read More

Morrisons supermarket suffers major pay-roll data breach after insider attack
British supermarket Morrisons has reportedly suffered a major data breach which saw the pay-roll data of a large but unspecified number of its 100,000 staff stolen and published on a website. Read More


SLIDESHOWS

12 hot cloud computing startups to watch: Product photo gallery

Cloud management, development, security and more.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Stupid user tricks: The most embarrassing flubs yet

2. What happens when your Office 365 subscription runs out? Ransom

3. All major browsers fall during second day at Pwn2Own hacking contest

4. 8 ways to improve wired network security

5. Microsoft dangles $50 carrot in front of XP users

6. Without proper security measures, smart homes are just begging to be targets

7. 12 cloud computing companies to watch

8. 13 cool high-tech prize competitions

9. What's better for your big data application, SQL or NoSQL?

10. Hackers may leak Microsoft spying docs, grant Bill Gates's wish for 'intense debates'


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: