Search This Blog

Friday, June 27, 2014

Gartner to IT security pros: Get ready for ‘digital business’

Network World Security - Newsletter - networkworld.com
Hackers found controlling malware and botnets from the cloud | Cyphort provides guidance on prioritizing APTs for mitigation

Network World Security

Forward this to a Friend >>>


Gartner to IT security pros: Get ready for 'digital business'
National Harbor, Md. -- There’s a “digital business” revolution coming and IT security professionals need to grasp the significance early on to be prepared to address whatever security needs arise. That was the message from Gartner analyst Jorge Lopez in the closing keynote at the Gartner Security and Risk Management Summit today. Digital business isn’t simply represented by what will be a growth in the so-called “Internet of Things.” IoT connectivity will be part of cars, trash cans, road sensors, medical devices, clothing, toys, parking meters, LED lighting and much more. Beyond this, the digital business revolution means what will happen with the information that can be gleaned from IoT and shared for business purposes.To read this article in full or to leave a comment, please click here Read More


RESOURCE COMPLIMENTS OF: Citrix Systems

Citrix NetScaler: A powerful defense against DoS attacks
Denial of service (DOS) attacks are on the rise and not only for large enterprises. The emergence of attacks targeting smaller companies and higher layers in the computing stack is increasing. Intruders are using low-bandwidth attacks disguised as legitimate transactions to bypass firewalls and basic intrusion prevention measures. Organizations need a better way to combat and prevent these attacks, and the right ADC can provide the solution. Learn how Citrix NetScaler can help protect against DOS attacks in the report, Citrix NetScaler: A Powerful Defense Against DOS Attacks.

WHITE PAPER: Guidance Software

The Total Economic Impact Of EnCase® Cybersecurity
Forrester Consulting conducted an analysis of the net benefit a global automobile manufacturer realized from the use of EnCase Cybersecurity. The research applied risk-adjusted calculations to the ROI and net benefits experienced in order to provide realistic expectations of the total economic impact that organizations can achieve. Learn more

Hackers found controlling malware and botnets from the cloud
In what is considered to be a natural evolution of tactics used by cybercriminals to infiltrate corporate networks, security firm Trend Micro has new evidence that more botnets and malware are being not only hosted in the cloud, but controlled remotely from cloud servers.The goal of hackers is to disguise their malicious software as regular traffic between corporate end points and cloud-based services.Trend Micro reported today through a blog post that it has observed the first instance of hackers using DropBox to host the command and control instructions for malware and botnets that have made it past corporate firewalls.“At end of the day, cybercriminals are business people,” says Trans Micro Global Threat Communications Manager Christopher Budd. “The same logic that drives business people to using cloud-based services is driving the bad guys to use the cloud too.” And that requires business end users to stay on their feet to combat these threats.To read this article in full or to leave a comment, please click here Read More

Cyphort provides guidance on prioritizing APTs for mitigation
Cyphort has announced a next generation threat defense system said to prevent and detect threats and help prioritize the highest risks so infosec professionals know how to focus their resources. Read More


WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

SCOTUS: 'Privacy comes at a cost' but 'get a warrant' before searching that phone
In huge win for digital privacy that will help pave the future of the Fourth Amendment, the Supreme Court unanimously ruled that Johnny Law needs a warrant before he can search the cellphone a person he arrested.Despite a former DHS official’s previous opinion that reduced the Supreme Court Justices to “nine Baby Boomers” who wouldn’t know the “creepy line” if it bit them on the butt, yesterday SCOTUS showed that people are still entitled to Fourth Amendment protections even in the digital age. "Our answer to the question of what police must do before searching a cell phone seized incident to an arrest is accordingly simple—get a warrant," they ruled (pdf).To read this article in full or to leave a comment, please click here Read More

Carnegie Mellon system lets you get to the good parts of video, fast
While Video has become ubiquitous thanks mostly to smartphones it doesn’t mean you want to actually watch all of it. Carnegie Mellon University computer scientists say they have invented a video highlighting technique called LiveLight that can automatically pick out action in videos shot by smartphones, GoPro cameras or Google Glass users. +More on Network World: NASA’s coolest 'way-out' future projects+ LiveLight constantly evaluates action in a video, looking for visual novelty and ignoring repetitive or eventless sequences, to create a summary that enables a viewer to get the gist of what happened. What it produces is a miniature video trailer. Although not yet comparable to a professionally edited video, it can help people quickly review a long video of an event, a security camera feed, or video from a police cruiser's windshield camera, according to Carnegie researchers.To read this article in full or to leave a comment, please click here Read More


WEBCAST: Network Instruments

3 Choices for Effective UC Management
This webcast discusses five best practices on how to successfully optimize and manage UC, as well as how to gain clear picture of overall performance and quickly troubleshoot when the inevitable issues arise. Learn More

VMware catches up with some Apache Struts patches, but not all
The company updates the version of Struts included in its vCenter Operations Management Suite product Read More

'Luuuk' banking malware may have stolen €500,000 in a week
Kaspersky Lab says the professional criminal group behind the operation is very active Read More

New iOS jailbreak could become sinister
The Pangu jailbreak has rankled a security researcher, who claims his work was improperly used Read More


SLIDESHOWS

5 potential Facebook killers

Outside of the obvious suspects – LinkedIn, Twitter and Google+ – who has the potential to unseat Facebook? Here are five possibilities.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 17 obscure Windows tools and tricks too powerful to overlook

2. First Look: Google's I/O announcements

3. Google trumps Microsoft's 1TB of storage with unlimited space

4. 100Mb/sec Ethernet coming to a car near you?

5. Early user of VMware NSX net virtualization tool

6. Gartner: Best practices for Amazon AWS security

7. Hungry ants knock out FiOS service … again

8. New iOS jailbreak could become sinister

9. Why One CIO Is Saying 'No' to BYOD

10. HP doubles enterprise switch capacity; calls revamped 5400R a Cisco Catalyst 4500 'killer'


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: