Search This Blog

Thursday, May 22, 2014

Cisco to acquire malware prevention company

Why companies should seek help in malware detection | Public utility compromised after brute-force attack, DHS says

Network World Security

Forward this to a Friend >>>


Cisco to acquire malware prevention company
Cisco this week announced its intent to acquire ThreatGRID, a New York-based maker of malware analysis and threat intelligence technology. Read More


WHITE PAPER: McAfee

Streamlining Response and Reaction to Attacks
This SANS white paper explores how to weave together and correlate information from disparately managed systems and bring visibility to their behavior with accurate, actionable reporting. View Now>>

WEBCAST: Dell SecureWorks

Counterstrategies for Combatting Social Engineering
Social Engineering is proving costlier than ever, especially phishing and spear phishing. With recent breaches, the imperative to counter social engineering effectively takes on a whole new level of urgency. In this webcast, the CISO for Dell SecureWorks discusses the realities of social engineering and what your organization must do to counter it. Learn more

Why companies should seek help in malware detection
Companies have shortened the amount of time between malware infection and discovery, but too few organizations detect the breach on their own, a security report found. Read More

Public utility compromised after brute-force attack, DHS says
A public utility in the U.S. was compromised after attackers took advantage of a weak password security system, according to a U.S. Department of Homeland Security team that studies cyberattacks against critical infrastructure. Read More


WEBCAST: Sourcefire, now part of Cisco

Innovations that Protect Against Advanced Attackers
This webinar will explore new technologies and process for protecting endpoints from advanced attackers and how innovations like continuous data collection combined with big data analytics are pushing the envelope for what security teams can do during and after an advanced attacker puts them in their sights. Learn more >>

FBI not changing the rules when hiring 2,000 hackers: Stoners need not apply
FBI Director James Comey needs to hire 2,000 agents to fight cybercrime, but the agency is having problems finding applicants who are not also potheads. The FBI employment drug policy says applicants can't have smoked pot in the last three years. Read More

Point-of-sale attacks accounted for a third of data breaches in 2013, report says
A third of data breaches investigated by security firm Trustwave last year involved compromises of point-of-sale (PoS) systems and over half of all intrusions targeted payment card data. Read More


WHITE PAPER: Apperian

Unlock the Value of Enterprise Mobility
Download this guide and learn how to manage the secure deployment of enterprise mobile apps and data, while still encouraging the levels of employee adoption needed to drive the productivity and ROI gains that are possible. Learn More

Hackers hit eBay database containing personal info, users asked to change passwords
EBay is asking users to change their passwords after attackers gained unauthorized access to eBay's corporate network, compromising a database containing encrypted passwords and other personal data. Read More

10 most powerful Internet of Things companies
Billions of connected devices means billions in revenue for these companies. Read More

Blackshades: The script kiddies lament
News broke this week that a massive global raid had taken place over two days which comprised of 359 coordinated searches in 16 countries and there were apparently 80+ arrests as a result. Why? Well apparently all of the aforementioned targets had a copy of the Blackshades remote access trojan or RAT. Read More

Five new threats to your mobile device security
Attacks that proved successful on PCs are now being tested on unwitting mobile device users to see what works -- and with the number of mobile devices with poor protection soaring, there are plenty of easy targets. "Attackers are definitely searching after the weakest point in the chain," and then honing in on the most successful scams, says Lior Kohavi, CTO at CYREN, a cloud-based security solutions provider in McLean, Va. Read More


SLIDESHOWS

Celebrating 25 years of Cisco Networkers

This year, Cisco recognizes the 25th anniversary of its Networkers user conference.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 20 cool things you can do with a Raspberry Pi

2. OpenStack: Still waiting for the users

3. Tech's top-paid CEOs

4. Rackspace not a good fit for Cisco, says Chambers

5. FIRST LOOK: Microsoft Surface Pro 3 tablet/PC

6. Windows XP on the police fingerprint scanner: What could possibly go wrong?

7. 25 cool cloud, security & mobile startups to watch

8. 17 fascinating facts about Apple's retail stores

9. 15 most powerful OpenStack companies

10. Cisco will lead SDN and win IT, Chambers says


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: