Search This Blog

Friday, August 08, 2014

Black Hat keynote: U.S. should buy up zero day attacks for 10 times going rate

Oracle issues a virtual strongbox for enterprise encryption keys | 10 ways to get noticed at Black Hat

Network World Security

Forward this to a Friend >>>


Black Hat keynote: U.S. should buy up zero day attacks for 10 times going rate
Las Vegas -- The U.S. government should pay 10 times the going rate for zero-day software flaws in order to corner the market and then make those vulnerabilities public to render them less potent for attackers, Black hat 2014 attendees were told yesterday. Dan Geer That would reduce the overall threats against Internet traffic in general and cost less than the damage that actual exploits cause, says Dan Geer, who is the chief information security officer at In-Q-Tel, the venture capital arm of the Central Intelligence Agency.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Cisco

Cisco Connected Mobile Experiences (CMX)
Amplify customer interactions with Cisco Connected Mobile Experiences. Our platform's Wi-Fi intelligence meets the needs of a growing mobile audience. And with Cisco Services, we'll help you design a mobile infrastructure that addresses your unique business goals for a high return on your investment. Learn more

WEBCAST: BMC Software

Boost Productivity with Self Service for Middleware
Middleware continues to play a significant role in the interconnectivity of applications across the enterprise. Find out how BMC Middleware Administration is used to increase productivity and meet ser requests. This session will provide insight into how to provide stakeholders with role-based self-service access to WebSphere MQ. Learn More

Oracle issues a virtual strongbox for enterprise encryption keys
Oracle Key Vault provides a central repository for storing enterprise encryption keys Read More

10 ways to get noticed at Black Hat
Hint: If blue wigs and aluminum-foil hats don't work, try free beer Read More

Google lowers search ranking of websites that don't use encryption
The move is intended to promote better security practices across the Web Read More


WHITE PAPER: Aerohive

The New Mobility: Astonishingly Simple and Powerful
Mobility has not only changed how we live, it is also dramatically changing the network infrastructures that we rely on. For the better. As organizations cope with a tidal wave of mobile users, mobile applications, and demand for pervasive access, it's becoming clearer that prior-generation approaches to providing mobility are breaking. Learn more

Five unanswered questions about massive Russian hacker database
Lots of questions follow Tuesday's revelation of the amassing of 1.2 billion credentials by Russian hackers Read More

IBM/DARPA turn out brain-like 5-billion transistor superchip
DARPA-funded IBM researchers today said they have developed a human brain-inspired computer chip loaded with more than 5 billion transistors and 256 million “synapses,” or programmable logic points, analogous to the connections between neurons in the brain.In addition to being one of the world’s largest and most complex computer chips ever produced it requires only a fraction of the electrical power of conventional chips to operate, IBM and Defense Advanced Research Projects Agency (DARPA) stated.+More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2014 (so far!); The weirdest, wackiest and coolest sci/tech stories of 2013+To read this article in full or to leave a comment, please click here Read More

INSIDER
Who's Paying for Your Tech Certification?
Professional Development – such as continuing education or tech certifications – remains one of the best ways for businesses to boost employee engagement and retention. If you haven't taken advantage of this perk, it's well worth looking into, but first find out who's footing the bill. Read More


WEBCAST: IBM

Charting Your Analytical Future
Date: August 26, 2014, 11:00 AM EDT The ability to embed prediction into multiple business processes amplifies the value that predictive analytics delivers. Yet many still see predictive analytics as a separate activity that is the responsibility of a small team of expert analysts. Register Now>>

Symantec patches privilege escalation flaws in Endpoint Protection
Exploit code for the flaws was released Tuesday Read More

PayPal's two-factor authentication is easily beaten, researcher says
Joshua Rogers decided to go public with the information after notifying PayPal of the problem on June 5 Read More

Stealthy malware 'Poweliks' resides only in system registry
The malware is persistent across system reboots, despite not having any files on disk Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Rackspace bows out of IaaS market

2. Why TCP/IP is on the way out

3. 2014's Starting Salaries for College Tech Majors

4. Wikipedia link censorship shows Bonnie & Clyde might have had 'right to be forgotten'

5. Microsoft's inconsistent Windows Phone 8.1 strategy stumbles forward

6. Top 20 colleges for computer science majors, based on earning potential

7. 10 disturbing attacks at Black Hat USA 2014

8. IE plays security catch-up, will block outdated Java plug-ins

9. Network-attached storage devices more vulnerable than routers, researcher finds

10. How to Survive 4 Cloud Horror Stories


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: