Search This Blog

Tuesday, July 08, 2014

5 things you no longer need to do for mobile security

Board of directors will have a profound impact on cybersecurity | Bloody June: What's behind last month's DDoS attacks?

Network World Security

Forward this to a Friend >>>


5 things you no longer need to do for mobile security
A couple of years ago companies were dismissive of BYOD, but as they’ve realized that the horse left the stable, they are adopting policies and next generation technologies to help manage BYOD. They also recognize that successful mobile security requires a cooperative partnership with employees, so are working with them to determine what policy works best for both parties, allowing BYOD to become part of the enterprise mobile security framework. + ALSO ON NETWORK WORLD 12 big BYOD predictions + As mobile security matures, some of the burden on IT has been alleviated. Thanks to next generation technologies, there are several things enterprises no longer need to do in order to keep mobile data secure. Here are five:To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

WHITE PAPER: HP

HP ArcSight ESM Solution Helps Bank to Combat Fraud
Turkey's Finansbank needed a way to spot potential fraud among millions of electronic transactions. But implementing a commercial fraud management application would take 18 months. Based on their experience using HP ArcSight Enterprise Security Manager (ESM) for IT security operations, they decided to adapt HP ArcSight ESM for fraud management. Learn More

Board of directors will have a profound impact on cybersecurity
According to a recent article in the Wall Street Journal, corporate boards are getting much more involved in cybersecurity. What’s driving this behavior? While the Target breach probably influenced this behavior, corporate boards now realize that cybersecurity has become a pervasive risk that could have an adverse impact on all businesses.This is consistent with recent ESG research that found 29% of security professionals working at enterprise organizations (i.e. more than 1,000 employees) said that executive management (and the corporate board) is much more engaged in cybersecurity situational awareness and strategy than it was two years ago, while another 40% stated that executive management (and the corporate board) is somewhat more engaged in cybersecurity situational awareness and strategy than it was two years ago (note: I am an ESG employee).To read this article in full or to leave a comment, please click here Read More

Bloody June: What's behind last month's DDoS attacks?
The list of DDoS attacks in the month of June has made for grim reading. High-profile sites have been targeted by extortion demands, online games got disrupted and at least one company was put out of business as a direct result. While it’s tempting to look for a single cause at the root of this apparent tsunami of distributed denial-of-service activity, the reality is considerably more complex. Online activism, the profit motive and even potential nation-state activity contributed to June’s high volume of DDoS attacks. + ALSO ON NETWORK WORLD: 10 security start-ups to watch | Privacy-focused Blackphone starts shipping to early adopters +To read this article in full or to leave a comment, please click here Read More


WEBCAST: Kemp Technologies

How To: Agile Hybrid Cloud Deployment with Virtual ADC's
The Growth of Hybrid Cloud is effecting companies of all sizes. In this webinar you will learn: How to deploy Hybrid Cloud Applications in Hours Not Weeks, Enable Security & High Availability for Apps Migrated to the Hybrid Cloud. Learn More

How to protect against watering hole attacks
Watering hole attacks are a relatively new phenomenon that have been successfully employed in a number of recent high profile attacks. What is a watering hole attack? Read More

Could a quadcopter land rovers on Mars?
ESA Taking a page from NASA’s rocket powered landing craft from it most recent Mars landing mission, the European Space Agency is showing off a quadcopter that the organization says can steer itself to smoothly lower a rover onto a safe patch of the rocky Martian surface.The ESA said its dropship, known as the StarTiger’s Dropter is indeed a customized quadcopter drone that uses a GPS, camera and inertial systems to fly into position, where it then switches to vision-based navigation supplemented by a laser range-finder and barometer to lower and land a rover autonomously.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Netscout Systems Inc.

Enabling Unified Service Delivery Management With nGeniusONE
Today's IT organizations manage diverse business services comprising a host of applications running on many server farms within the data center. NetScout provides a highly scalable, unified approach to service delivery management that enables efficient, topdown performance management across complex application, server and network tiers. Learn More

Cisco's Latest CCNP Security Updates
Cisco has given us a big makeover for one of their premier Professional Level Certifications - the Cisco Certified Network Professional Security (CCNP Security) Certification. The 2014 updates retire some devices and technologies from coverage, and replace these with some of the latest and greatest in Cisco's security portfolio. It does seem that in the area of security, Cisco makes the most sweeping changes, retiring products with no warning. The ever-changing network security landscape certainly helps to make this a reality.  As we examine this updated certification, the first thing to consider is the prerequisite requirements. Prerequisites The most common method of meeting the prerequisites is to simply possess the CCNA Security certification. The simplest path to CCNA Security is to possess the CCENT Certification and then pass 640-554 IINS. To read this article in full or to leave a comment, please click here Read More

Enterprise Organizations Are Taking Steps to Improve Cybersecurity Analytics
Read More


SLIDESHOWS

10 disturbing attacks at Black Hat USA 2014

Attacking car systems, Google Glass for password theft, using free cloud trials to launch botnets, more.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 disturbing attacks at Black Hat USA 2014

2. FixIt giving away 15K iPhone 'liberation kits'

3. Tools catch security holes in open source code

4. Wzor's return brings Windows 9 rumors

5. 4 key features coming to Windows 9 (hopefully)

6. Google is killing off Orkut

7. 10 Bad Coding Practices That Wreck Software Development Projects

8. 10 security start-ups to watch

9. HP's giant Proliant challenges big iron from IBM, Oracle

10. Netflix open sources its Amazon cloud security enforcer


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: