Search This Blog

Friday, March 21, 2014

IBM rolls “Big Data” software to combat big business fraud

  Google tightens HTTPS protections in Gmail in light of government snooping | Symantec fires CEO, appoints interim replacement

 
  Network World Security

Forward this to a Friend >>>


IBM rolls "Big Data" software to combat big business fraud
IBM today introduced software that can be used by business to combat attempted fraud in insurance, financial and healthcare settings by applying "Big Data" analytical concepts that bring together various data streams to decide whether someone appears to be perpetrating fraud. Read More
 


RESOURCE COMPLIMENTS OF: Juniper Networks

Meet the Future of Data Center Security
The data center is under attack by constant, evolving security threats. New threats call for a new approach. Juniper Networks security solutions employ intrusion deception technology based on three principles: know the threat is real, control attackers' actions and expose their device information to a global database. Play the game. Deploy the solution. Save the future. It begins at DeceptionForce.org

WHITE PAPER: HP

1:1 and Common Core Online Testing
Learn how to properly implement standardized electronic testing which will help your district avoid common pitfalls in implementing Common Core online assessments. Download the whitepaper now. Learn More>>

Google tightens HTTPS protections in Gmail in light of government snooping
Citing the need to protect users from government cyber-spying, Google has tightened Gmail's encryption screws by removing the option to turn off HTTPS. Read More
 

Symantec fires CEO, appoints interim replacement
Symantec fired its second CEO in less than two years on Thursday, dismissing Steve Bennett and putting a board member in charge while the security vendor searches for a permanent replacement. Read More
 

McGovern recalled as 'a catalyst of the computer industry'
  In June 1967, when Patrick J. McGovern published the first issue of Computerworld it did something different. It reported on the computing industry from a user perspective. Read More
 


WEBCAST: IBM

Increasing the Value of Your Reports and Dashboards
Learn how incorporating other analytical capabilities such as predictive modeling and visualization can increase the value of your reports and dashboards by providing insight from complex data or predicting a future outcome. Register Now

Security should no longer be 'cementing' the status quo
When considering the alarming number of mega-data breaches and other such security incidents as they occur almost daily, and then compare the announced "root causes" and "used attack paths" of the incidents with the current state-of-the-art strategies to defend against attacks, I have come to conclusion that, unfortunately, security (risk, audit, and compliance, and any other assurance functions) is more often than not only "cementing" the status quo, that is the currently used processes or ways of doing business in a somewhat "secure" fashion. Read More
 

5 Ways to Prevent Data Loss in Mobile Environments
Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data loss on mobile devices. Read More
 

Fake Tor app has been sitting in Apple's App Store for months, Tor Project says
For the past several months Tor developers have unsuccessfully been trying to convince Apple to remove from its iOS App Store what they believe to be a fake and potentially malicious Tor Browser application. Read More
 


WHITE PAPER: Instart Logic
 
Web Application Streaming: A Radical New Approach
This whitepaper discusses: -The challenges of balancing more complex web applications, impatient users and clogged wireless networks -Web Application Streaming as a new approach to accelerating high fidelity, high resolution web experiences -Deep Dive into the components of the Instart Web Application Streaming Network™ Learn More>>

Researchers find cross-platform RAT for Windows, Android
  A remote access tool used to commandeer a Windows PC has been found to also include an Android component, an indication that hackers are seeking cross-platform RATs for PCs and mobile devices, a researcher says. Read More
 

Tech pros name their most-wanted perks
Attention hiring managers: These are the perks that will give you an edge in the fight for top talent. Read More
 

20 infamous hacker security vendor break-ins
Here are 20 of the most notorious known break-ins over the past decade. Read More
 

13 cool high-tech prize competitions
NASA, DARPA, IBM and others offer prize money for your time and expertise Read More
 

Best Instagram accounts of enterprise technology companies
Cisco, CA, IBM all diving deep into Facebook-owned photo-sharing app Read More
 

 

SLIDESHOWS

12 hot cloud computing startups to watch: Product photo gallery

Cloud management, development, security and more.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Google Graveyard: Here's what Google has killed so far in 2014

2. Why Google Apps is winning IT hearts and minds

3. Most ATMs will remain on Windows XP after Microsoft's pulls plug on OS

4. "We need more scientific mavericks"

5. Cisco gets fresh mid-range router competition

6. Microsoft's Lync surging as PBX choice in North America

7. Cisco's 10 most opportunistic acquisitions

8. Ex-Microsoft employee arrested, accused of stealing Windows RT, product activation secrets

9. Ex-Microsoft employee arrested, accused of stealing Windows RT, product activation secrets

10. 12 hot security start-ups you need to know


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: