Search This Blog

Wednesday, June 11, 2014

Mobile app data collection poses risks for enterprises, Gartner says

Behind the Great Firewall: What it's really like to log on from China | Amazon AWS continues to use TrueCrypt despite project's demise

Network World Security

Forward this to a Friend >>>


Mobile app data collection poses risks for enterprises, Gartner says
Consumer data collected through mobile devices should be considered a full 'citizen' of companies' data infrastructure Read More


WEBCAST: Dell SecureWorks

What Can Security Leaders Do to Combat Cyber Threats?
Training employees to understand the risk they create for your organization when they don't consider security in their day-to-day activities is a challenge for most IT and IT security organizations. Changing behavior is always difficult, especially when security awareness programs lack a well-defined approach and dedicated resources. I Learn more

WHITE PAPER: OPSWAT

Advanced threat detection methods for securing remote users
Remote users can introduce significant threats to your network. As employees and other business partners increasingly work from the road and remote offices, the risks have grown exponentially. To secure remote users, unique advanced threat detection solutions are needed. Learn more

Behind the Great Firewall: What it's really like to log on from China
Censorship in China affects many popular Internet services and websites, but there are ways to make do Read More

Amazon AWS continues to use TrueCrypt despite project's demise
Importing and exporting data from Amazon Simple Storage Service requires TrueCrypt Read More


WHITE PAPER: Juniper Networks

Security in the Next-Generation Data Center
This white paper examines these trends, and it reveals the key capabilities that today's security teams require to effectively ensure that vital corporate assets remain secure, while at the same time optimizing access, cost, and administrative efficiency. View Now

RSS service Feedly vows to resist DDoS extortionists
RSS aggregator Feedly today vowed not to give in to an extortion demand backed by a distributed-denial-of service (DDoS) attack that knocked its site offline eary Wednesday. Service was briefly restored at approximately 11:15 a.m. ET (8:15 a.m. PT), only to evaporate moments later. DDoS attacks, often launched from botnets of previously-compromised PCs, swamp a website's servers with huge quantities of traffic. The result: The site either slows to a crawl or goes dark. "Criminals are attacking Feedly with a distributed denial of service attack. The attacker is trying to extort us money to make it stop. We refused to give in and are working with our network providers to mitigate the attack as best as we can," said Edwin Khodabakchian, Feedly CEO, in a statement at 5 a.m. ET (2 a.m. PT).To read this article in full or to leave a comment, please click here Read More

Zeus Trojan alternative created from scratch hits the underground market
A new Trojan program that can spy on victims, steal login credentials and interfere with browsing sessions is being sold on the underground market and might soon see wider distribution. The new threat is called Pandemiya and its features are similar to that of the infamous Zeus Trojan program that many cybercriminal gangs used for years to steal financial information from businesses and consumers. Zeus source code was leaked on underground forums in 2011, allowing other malware developers to create Trojan programs based on it, including threats like Citadel, Ice IX and Gameover Zeus, whose activity was recently disrupted by an international law enforcement effort.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

Why Mobile Strategies Are Stalling at Many Enterprises
If your business hasn't heard about the mobile revolution by now, well, you might want to crawl out of your cave and enjoy the sunlight with everyone else. Mobility is what the business consultants call "transformative" technology that affects nearly every company in every industry.To be fair, the problem isn't that enterprises aren't aware of the impact of mobile technology. The problem is that many companies aren't doing mobility right. Only two out of five companies have made good progress in their mobility efforts, according to a recent Accenture survey of nearly 1,500 C-level executives. The rest, not so much.To read this article in full or to leave a comment, please click here Read More

Most U.S. credit cards will have microchips by end of 2015
The long expected migration of the U.S. payment system to the Europay MasterCard Visa (EMV) smartcard standard finally appears to be gathering steam.The Aite Group Tuesday issued a report projecting that 70% of all U.S. credit cards, and about 41% of debit cards -- 1.1 billion cards in total -- will be EMV-enabled by the end of 2015.Interviews with 18 of the top 40 credit and debit card issuers, including 7 of the top 10, show that banks are moving full speed ahead with EMV implementation plans, Aite Group research director Julie Conroy said today. "A majority of Americans will have EMV cards in their wallets by the end of 2015," she said.To read this article in full or to leave a comment, please click here Read More

Coolest house in the world: A Boeing 727
"Image by REUTERS/Steve DipaolaPerhaps it is just a nerd’s delight, but Bruce Campbell, a former electrical engineer has made a Boeing 727 airliner his home – well for six months out of the year anyway. He spent about $220,000 to get the airliner into the kind of shape he could live in. “When properly executed, the remarkable appeal of a retired jetliner as a home springs from the magnificent technology and beauty of the sculptured structure itself. Jetliners are masterful works of aerospace science, and their superlative engineering grace is unmatched by any other structures people can live within. They're incredibly strong, durable, and long lived. And they easily withstand any earthquake or storm,” Campbell wrote on his blog about the aircraft. Take a quick look.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

Network World's 2014 State of the Network survey

Exclusive research from Network World shows that cloud and mobility are gaining in importance.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Daunting photos of a village built to handle electronic waste

2. What's the best approach to building next-generation data center networks?

3. This IT worker had to train an H-1B replacement

4. iOS 8 MAC randomizing just one part of Apple's new privacy push

5. Gartner Magic Quadrant shifts focus from MDM to Enterprise Mobility Management

6. HP unveils Cisco-like SDN switch

7. HP has lots to Discover

8. How to change Windows 8.1 to local account with no Microsoft email account required

9. I guess California Chrome owner can kiss Google endorsement goodbye

10. Quick Look: Ubuntu GNOME 14.04


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: