Search This Blog

Thursday, April 03, 2014

How to respond to a data breach

FBI: Elaborate $1 million Verizon iPhone, iPad fraud busted | Apple patches Safari's Pwn2Own vulnerability, two-dozen other critical bugs

Network World Security

Forward this to a Friend >>>


How to respond to a data breach
Data breaches seem to be happening at an absurdly rapid rate these days with reported incidents involving the theft of personally identifiable information hitting 25,566 in 2013 up from 10,481 in 2009. Read More


WHITE PAPER: F5 Networks

Why App-Centric Policies May Be Best
Application-centric firewall policy management is a new approach to managing firewall policy that is gaining traction in the IT community because it offers better performance, manageability, and visibility. Read more>>

WHITE PAPER: F5 Networks

Keep Company Assets Secure with Federated IAM
As enterprises continue to depend on the cloud for application delivery, and more workers are using multiple devices to access those applications, the need to control who has access to what will grow. This Technology Spotlight discusses the growing need for security in today's cloud-based, mobile world of IT, and the rise of SaaS-based solutions. Learn more >>

FBI: Elaborate $1 million Verizon iPhone, iPad fraud busted
The FBI said a man admitted he ripped off more than $1 million worth of iPhones and iPads from Verizon Wireless using an elaborate scheme that involved misappropriating corporate purchasing accounts and bribing Federal Express drivers. U.S. Attorney Paul J. Fishman said Stephen Gunn of Chicago, 36, pleaded guilty before U.S. District Judge in Newark federal court to an indictment charging him with... Read More

Apple patches Safari's Pwn2Own vulnerability, two-dozen other critical bugs
Apple on Tuesday patched the security vulnerability in Safari that was successfully exploited at last month's Pwn2Own hacking contest, where a team cracked the browser to win $65,000. Read More


WHITE PAPER: CDW

Smarter Environmental Analytics Solutions
This IBM Redbooks® Solution Guide describes a solution for implementing smarter environmental monitoring and analytics for oil and gas industries. The solution implements real-time monitoring of environmental data to facilitate early detection of, and response to, operational events surrounding offshore oil and gas installations. View Now

The ultimate Windows XP quiz
Microsoft Windows XP is so beloved that users won't let it go. But how well do you know XP? Read More

Bitcoin wallet service Coinbase denies security breach as user names posted online
Bitcoin wallet service Coinbase has denied it suffered a security breach, but acknowledged that a list of some of its users has been circulating on the Web. Read More


WHITE PAPER: HP and Intel® Xeon® processors

Optimize your Virtualization Efforts
The interdependencies between server, storage, and network elements must be balanced to maximize virtual machine performance and sizing. This Brief summarizes the benefits of using a converged and intelligent blade-based infrastructure to support today's highly virtualized environments. Learn More

FireEye, AhnLab score low in lab test of breach detection systems
In an evaluative lab test, FireEye and Ahnlab each scored "below average" on their breach-detection systems (BDS) in a comparative group product test which was conducted by NSS Labs. Read More

The 10 computer science programs with the biggest payoff
New data reveal which schools offer the best dollar-for-dollar return on your investment in a computer science degree in 2014 Read More

Google asks US Supreme Court to review ruling on Wi-Fi packet sniffing
Google has asked the U.S. Supreme Court to review a decision by an appeals court that its collection of data from unencrypted Wi-Fi networks is not exempt under federal wiretap laws. Read More

Ad tracking: Is anything being done?
Online tracking is on the rise, but efforts to create a practical Do Not Track policy have slowed to a crawl. Meanwhile, users and browser companies are taking matters into their own hands. Read More


SLIDESHOWS

Hot products at Interop

These products are on display at the annual tech conference in Vegas.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Grading Google's April Fools' Day

2. Cisco reveals OpenFlow SDN killer

3. Techie April Fools' Day – in pictures

4. Comcast vs. Google: How a potential broadband battle could impact consumers

5. 16 terrible computer pranks that could get you fired

6. Hot products at Interop

7. HP bucks up unified access line to better battle Cisco, others

8. 5 things we love/hate about Fedora 20

9. Google asks US Supreme Court to review ruling on Wi-Fi packet sniffing

10. Microsoft slashes Azure prices, introduces new basic tier


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: