Search This Blog

Tuesday, May 06, 2014

IBM: Security threat prevention isn't 'dead' yet!

  Review: FireEye fights off multi-stage malware | Video: Exploring False Positives and False Negatives within IPS
   
  Network World Security

Forward this to a Friend >>>


IBM: Security threat prevention isn't 'dead' yet!
There's been much discussion in the security industry that preventing malware-based infiltrations into the enterprise is nigh on impossible, and the new security mantra should be "rapid detection is the new prevention." On that, IBM begs to differ. Read More
   




WHITE PAPER: McAfee

Get Proactive About Managing Security and Risk
Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis. View Now>>

Review: FireEye fights off multi-stage malware
You can't see some malware until it's too late. Sophisticated attacks arrive in pieces, each seemingly benign. Once these advanced attacks reassemble, the target is already compromised. Read More

Video: Exploring False Positives and False Negatives within IPS
Intrusion Prevention Systems are designed to detect and block malicious traffic in a network or on an endpoint. The most critical function that these systems provide is the ability to make a judgment about the nature of a network flow, determining whether the traffic is legitimate or malicious. Read More

On security reports and weather forecasts
Well we are deep into the security report season. What started as a drizzle with the RSA conference has turned into a torrent. Of course the Verizon Data Breach report has become the big dog of security reports, but it is far from alone. Many of these reports contain some great data and metrics. Read More

Security Chalk Talk: How False Negatives Occur with Intrusion Prevention Systems
Security Chalk Talk: How False Negatives Occur with Intrusion Prevention Systems Read More


WHITE PAPER: OPSWAT

Advanced threat detection methods for securing remote users
Remote users can introduce significant threats to your network. As employees and other business partners increasingly work from the road and remote offices, the risks have grown exponentially. To secure remote users, unique advanced threat detection solutions are needed. Learn more

No reasonable expectation of privacy when third parties cross the creepy line?
There's a "creepy line" when tech conveniences and capabilities seem to push too far into privacy rights; yet not everyone can be trusted to decide whether or not new technology used by the government crosses the "creepy line" and if Fourth Amendment protections should kick in. That includes SCOTUS, according to a former DHS official, who reduced the Supreme Court Justices to "nine Baby... Read More

Data breaches 9% more costly in 2013 than year before
It cost U.S. companies hit by data breaches last year an average of $5.4 million to cope with the after-effects – up 9% from the year before, according to the ninth annual Ponemon Institute study published Monday. Read More

Open campus, security nightmare
It sounds like a security oxymoron: Protect educational institutions that are meant to be, as Fitchburg State University information security officer (ISO) Sherry Horeanopoulos put it, "wide-open and unguarded." Read More

Symantec partners to fend off zero-day attacks
Symantec today announced its Advanced Threat Protection (ATP) effort for new products and managed security services to support enterprise customers in fending off targeted zero-day attacks in particular. One first step in this entails partnering with Check Point Software, Cisco and Palo Alto Networks to share threat detection information that can rapidly be integrated into Symantec endpoint protection software. Read More


: RES Software

Intuit Turns to Self-Service IT
Intuit empowered its users to resolve their own IT issues with a consumer-like experience to free IT to focus on more strategic initiatives. See how Intuit got here Learn more

Hackers capture dynamic data to prepare for effective, stealthy attacks
"Offensive forensics is an attack technique hackers use to capture non-static data that can be useful in performing further attacks," says Joe Sremack, Principal, Berkeley Research Group, LLC, a computer forensics and e-discovery firm. Read More

10 Ways to Keep Windows XP Machines Secure
Now that Microsoft's support for the popular Windows XP operating system has ended, you'll need to use every trick in the book to stop your machines from being compromised. Read More

Aggressive, persistent Windows tech support scammers continue to stalk consumers
Scammers pretending to be Microsoft support technicians continue to work the phones in search of victims and have grown bolder in their tactics. Read More

11 reasons encryption is (almost) dead
Massive leaps in computing power, hidden layers, hardware backdoors -- encrypting sensitive data from prying eyes is more precarious than ever Read More

10 tips to attract women to infosec jobs
Women make up just 11 percent of information security professionals.A Just increasing that number to 22 percent would solve the industry's staffing shortage problem. Read More

 

SLIDESHOWS

7 cool free open source projects you need to check out

The free open source world continues to expand at a phenomenal pace.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. How to Become a Better Leader

2. 25 geeky Mother's Day gifts

3. IT Salaries for the 20 Hottest Tech Skills

4. Gates cedes Microsoft shareholder crown to former No. 2, Ballmer

5. 11 reasons encryption is (almost) dead

6. Unisys unveils invisibility cloak for network traffic

7. The Camera That Killed the Jeep – Part 2

8. Unplugging the data center

9. Symantec partners to fend off zero-day attacks

10. Microsoft cheaper to use than open source software, UK CIO says


 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: