Tuesday, June 10, 2014

Real-World Horror Stories Show Why Data Security Is So Hard

Hackers behind iPhone ransom attacks arrested in Russia | DARPA wants inflatable bundles to make rooms, walls or blockades – without human intervention

Network World Security

Forward this to a Friend >>>


Real-World Horror Stories Show Why Data Security Is So Hard
In today's bring-your-own-device and cloud services enterprise, real-world stories of data loss abound. What's really horrifying: Things seem to be getting worse. Read More


RESOURCE COMPLIMENTS OF: Dell

Achieve Deeper Network Security and Control
Next-generation firewalls (NGFWs) revolutionized network security. Traditional firewalls that only focus on stateful packet inspection and access control rules are ineffective in today's advanced-threat environment. To protect your organization from threats, your NGFW must be able to deliver a deeper level of network security. Learn why Dell™ SonicWALL™ NGFWs are the only firewalls capable of providing organizations of any size with the proper level of network security.

WEBCAST: Dell SecureWorks

What Can Security Leaders Do to Combat Cyber Threats?
Training employees to understand the risk they create for your organization when they don't consider security in their day-to-day activities is a challenge for most IT and IT security organizations. Changing behavior is always difficult, especially when security awareness programs lack a well-defined approach and dedicated resources. I Learn more

Hackers behind iPhone ransom attacks arrested in Russia
A man and a teenaged boy are accused of using phishing and social engineering attacks to hijack Apple IDs and lock iOS devices Read More

DARPA wants inflatable bundles to make rooms, walls or blockades – without human intervention
This one sounds a little like something Wile E Coyote might order from the Acme Co. to stop the Roadrunner. The Defense Advanced Research Projects Agency (DARPA) announced that it is looking for information on the best way to build what it called a “ a compact system that can expand into a large structure, like a web, wall, blockade or barrier, without human intervention. +More on Network World: The zany world of identified flying objects+ Specifically DARPA said it “envisions a compact system filled with a material and/or device that when remotely triggered, can expand by orders of magnitude and form a structure to prevent ingress or egress by a person/people.”To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: OPSWAT

Advanced threat detection methods for securing remote users
Remote users can introduce significant threats to your network. As employees and other business partners increasingly work from the road and remote offices, the risks have grown exponentially. To secure remote users, unique advanced threat detection solutions are needed. Learn more

Chinese cyberspies targeting U.S, European defense, space sectors
A Chinese cyberespionage group operating out of Shanghai has been launching targeted attacks against the U.S. defense and European aerospace industries, a security vendor reported.[U.S. files indictments against Chinese officials for espionage]Dubbed Putter Panda, the group has connections to the People's Liberation Army, CrowdStrike said in a report released Monday. The vendor has been tracking the group since 2012.To read this article in full or to leave a comment, please click here Read More

Start-up wants to use Big Data to thwart security threats
Start-up Exabeam today came out of stealth mode, saying it plans to make available a big data security analytics product in a few months to help bring greater precision in identifying threats and incidents. Exabeam’s three co-founders include its CEO Nir Polak, vice president of products Sylvain Gil, both formerly with Imperva, and chief technology officer Domingo Mihovilovic, formerly with Sumo Logic. They say they’ve come up with machine-learning technology that can utilize the information gained through a company’s existing security tools to squeeze needed precision out of them. +More on Network World: 12 hot security start-ups to watch | DARPA system to blend AI, machine learning to understand mountain of text+To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Mobiquity Inc.

BYOP: How Mobile and Social Are Creating New User Personas
The digital world of mobile + social creates new customer segments and behaviors. Companies need to reorient their customer interactions around these segments to drive business impact. Learn More

Daunting photos of a village built to handle electronic waste
"Image by REUTERS/Oswaldo RivasReuters calls it a hub for electronic rubbish. That would be Dongxiaokou village, which sits on the outskirts of Beijing in China. Here all manner of  e-waste is sent to be stripped for recycling or just plain scrap. Dongxiaokou’s residents grapple with poor infrastructure and sanitation facilities, in addition to dangers associated with handling e-waste. The village is now facing demolition and residents are worried about losing their homes and work, according to Reuters. China is now the planet’s second biggest producer of it, only behind the United States, according to information from a 2013 environmental conference.To read this article in full or to leave a comment, please click here Read More

How do mobile location services threaten users?
GAO report says rules governing use of location data need to get tougher Read More


SLIDESHOWS

Network World's 2014 State of the Network survey

Exclusive research from Network World shows that cloud and mobility are gaining in importance.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. What's the best approach to building next-generation data center networks?

2. 10 Father's Day Gifts to Help Dad Feel Young and Cool

3. Rack-mount? ... We don't need no stinkin' rack-mount

4. How to change Windows 8.1 to local account with no Microsoft email account required

5. Critical flaw in encryption has been in OpenSSL code for over 15 years

6. Cisco takes early lead in SDN thought leadership

7. iPhone 6 rumor rollup for the week ending June 6

8. Amazon picked a fight with VMware in the cloud, and VMware fought back

9. 5 non-Apple keyboards for iOS 8 devices

10. Motorola declares war on the feature phone


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment