Search This Blog

Friday, May 09, 2014

IBM: Security threat prevention isn't 'dead' yet!

Microsoft calls out malicious downloaders | Open campus, security nightmare

Network World Compliance

Forward this to a Friend >>>


IBM: Security threat prevention isn't 'dead' yet!
There's been much discussion in the security industry that preventing malware-based infiltrations into the enterprise is nigh on impossible, and the new security mantra should be "rapid detection is the new prevention." On that, IBM begs to differ. Read More


WHITE PAPER: Plantronics

Unleash your UC Potential By Putting Users First
What's holding back Unified Communications (UC) adoption? Too often, today's solutions are simply too hard to use. Now, survey results show high-quality audio and a simple and intuitive user experience can turbo-charge acceptance. Read this exclusive report from Plantronics and IDG to learn how you can start making the most of UC. Read now!

WHITE PAPER: Tintri Inc.

Simplify VMware Backup & Recovery
Simplify storage for your VMware environment. Read data protection capabilities available for VMware VADP backup and recovery, the advantages and disadvantages of different backup solutions, and how these backup methods impact both the backup and restore workflows. Learn more

Microsoft calls out malicious downloaders
Microsoft is putting makers of downloader software on notice when it sees that their products are being used to infect PCs, and it is telling anti-virus vendors that perhaps these downloader programs ought to be tagged as malware. Read More

Open campus, security nightmare
It sounds like a security oxymoron: Protect educational institutions that are meant to be, as Fitchburg State University information security officer (ISO) Sherry Horeanopoulos put it, "wide-open and unguarded." Read More

INSIDER
It's Time for Spring Cleaning in the IT Closet
CIOs: Here's how to reduce the clutter in your IT operation and ensure that simplicity becomes part of your corporate culture. Read More

Review: FireEye fights off multi-stage malware
You can't see some malware until it's too late. Sophisticated attacks arrive in pieces, each seemingly benign. Once these advanced attacks reassemble, the target is already compromised. Read More


WHITE PAPER: Intigua

Systems Management Virtualization
Discover how virtualizing the management layer, by de-coupling agents from the underlying server infrastructure, eliminates the need to install physical agents on servers and makes ongoing management tasks such as provisioning and updating agents as simple as copying a single "virtual agent" file to all required servers. Read more. Learn More

Dropbox fixes flaw that exposed user documents
Dropbox has patched a vulnerability that made it possible for unauthorized people to view documents that had been shared through the online file-sharing service. Read More

Hackers capture dynamic data to prepare for effective, stealthy attacks
"Offensive forensics is an attack technique hackers use to capture non-static data that can be useful in performing further attacks," says Joe Sremack, Principal, Berkeley Research Group, LLC, a computer forensics and e-discovery firm. Read More

New buys for EMC may come in security, big data
EMC may be in the market for security and data analytics acquisitions as it builds out what it calls a federation of businesses among VMware, RSA Security, Pivotal and the company's traditional storage operations. Read More

Going, going, gone: What XP's end of support means for your business
Some 500 million copies of XP were running before Microsoft declared the stalwart operating system dead, and doubtlessly many still soldier on. Read More


WEBCAST: Brocade Communications

IT Agility: How Do You Stack Up?
Are you faced with increasing pressure to deploy technology faster? You're not alone. This year, over half of enterprises will be prioritizing building a private cloud, a concept introduced less than five years ago. View Now>>

FireEye buying nPulse for $70M to gain security analytics 'flight recorder'
Threat protection company FireEye Tuesday announced it's acquiring nPulse Technologies, a privately-held maker of high-speed packet-capture, network analysis and forensics gear, for $70 million in a cash-stock deal expected to close during the second quarter. Read More

Is that Twitter account a bot? Researchers make app to find out
They spread lies. They push products you don't care about. They make unpopular people look popular. Sometimes, they take over your machine with malware. Read More

11 reasons encryption is (almost) dead
Massive leaps in computing power, hidden layers, hardware backdoors -- encrypting sensitive data from prying eyes is more precarious than ever Read More

10 tips to attract women to infosec jobs
Women make up just 11 percent of information security professionals.A Just increasing that number to 22 percent would solve the industry's staffing shortage problem. Read More


SLIDESHOWS

7 cool free open source projects you need to check out

The free open source world continues to expand at a phenomenal pace.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Worst of DRM set to infest physical law school casebooks

2. 10 nerdiest Linux gadgets

3. 7 in 10 office workers barely use Microsoft Office anymore

4. Inside United Airlines' nerve center

5. Microsoft calls out malicious downloaders

6. The day the AV died

7. Adobe Voice video app focuses on narration

8. FBI: "Sky was the limit" for this now jailed scammer

9. Will Wave 2 of 802.11ac minimize Ruckus Wireless' advantage?

10. Is that Twitter account a bot? Researchers make app to find out


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: