Microsoft researchers: Re-use the same password across sites likely to be hacked | There's almost a million fake apps targeting your phone | ||||||||||
Network World Security | ||||||||||
The Black Hat Quiz 2014 RESOURCE COMPLIMENTS OF: Citrix Systems Defend Web Properties from Threats with Citrix NetScaler Customers, employees and partners are more frequently accessing web-delivered services from their mobile devices. At the same time, attackers are constantly discovering new ways to compromise security, including advanced malware and application layer attacks. Without the right tools, you are vulnerable. NetScaler provides the visibility and control to manage, accelerate, and secure web properties, so you can deliver the service and security your users demand. To learn more, read the report: Defend Web Properties from Modern Threats with NetScaler. In this Issue
WHITE PAPER: HP Protecting Your Mid-Size Business from Security Threats Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. And 60% of small businesses fail within six months of falling victim to a cyber attack. Learn More Microsoft researchers: Re-use the same password across sites likely to be hacked WHITE PAPER: Juniper Networks Security in the Next-Generation Data Center This white paper examines these trends, and it reveals the key capabilities that today's security teams require to effectively ensure that vital corporate assets remain secure, while at the same time optimizing access, cost, and administrative efficiency. View Now There's almost a million fake apps targeting your phone WHITE PAPER: HP Why you need a next-generation firewall This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More Microsoft's future under Nadella less about Windows, more about mobile and cloud
As businesses look to take advantage of SMAC (social, mobile, analytics, and cloud) platforms, they first need to consider the risks and security implications of the technologies involved Read More
SSL Blacklist project exposes certificates used by malware | ||||||||||
SLIDESHOWS Worst data breaches of 2014 So far We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). MOST-READ STORIES 1. Ubuntu 14.04: Is Canonical taking on too much 2. Microsoft COO tells partners to get with the cloud program now 3. Say goodbye to desktop phones 4. Apple, IBM join to make iOS the default mobile platform 5. Windows Phone 8.1 and its first update could appear this week 6. U.S. malware share rising, Amazon service No.1 in hosting it 7. 10 disturbing attacks at Black Hat USA 2014 8. Microsoft may lay off over 6,000 employees 9. Russian hackers breach CNET, steal one million usernames, passwords and email addresses 10. Microsoft rumored to be buying security firm that publicized Active Directory exploit | ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
No comments:
Post a Comment