Search This Blog

Wednesday, August 06, 2014

Cisco: Blackhole arrest cuts exploit-kit traffic, but don't let your guard down

Intelligence agency wants brain tools to tell: Who's the smartest of them all? | Defining F5's role in software defined networks

Network World Cisco

Forward this to a Friend >>>


Cisco: Blackhole arrest cuts exploit-kit traffic, but don't let your guard down
Exploit kits of cybercrime tools fell into a big slump in the first half of this year after Russian authorities nabbed the alleged creator of the popular Blackhole kit, but users aren’t necessarily safer.Blackhole so dominated the shadowy market for exploit kits, or bundles of code for taking advantage of known software vulnerabilities, that the number of URL requests associated with exploit kits fell by 87 percent in the first half, according to the Cisco 2014 Midyear Security Report. The report was released on Tuesday during the Black Hat security conference in Las Vegas.To read this article in full or to leave a comment, please click here Read More


WEBCAST: Cisco Systems

Innovations that Protect Against Advanced Attackers
This webinar will explore new technologies and process for protecting endpoints from advanced attackers and how innovations like continuous data collection combined with big data analytics are pushing the envelope for what security teams can do during and after an advanced attacker puts them in their sights. Learn more >>

WEBCAST: Fortinet

What should I look for in a Next Generation Firewall?
With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different. John Pescatore of SANS Institute originally coined the phrase and now explains what he suggests enterprises look for when considering alternative NGFW solutions. Learn more >>

Intelligence agency wants brain tools to tell: Who's the smartest of them all?
Reuters Can a tool or technology be applied to the brain and accurately predict out of a given group of people who will be the smartest?The research arm of the Office of the Director of National Intelligence, Intelligence Advanced Research Projects Activity (IARPA) is looking for exactly those kinds of tools.“IARPA is looking to get a handle on the state of the art in brain-based predictors of future cognitive performance. In particular, IARPA is interested in non-invasive analyses of brain structure and/or function that can be used to predict who will best learn complex skills and accomplish tasks within real-world environments, and with outcome measures, that are relevant to national security.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Riverbed Technology

How WAN Optimization Helps Enterprises Reduce Costs
If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity comes in two forms: user experience and infrastructure efficiency. Read Now

Defining F5's role in software defined networks
I think it’s fair to say that almost every vendor even remotely associated with the data center has tossed its hat in the software defined network (SDN) arena over the past few years. The goal here is to obviously ride the hype wave while the topic is red hot. I think it’s also fair to say that F5 Networks is one of the dominant data center vendors today with about 50% share in the Application Delivery Controller (ADC) market. So this raises a good question – what, if any, is F5’s role in the world of SDNs? I’ve had a number of my investor clients ask me about this recently, so I thought I’d summarize my thoughts here.Before we get into F5 specifically, we should ask another question - is there a role for an ADC in an SDN? I’ve heard some speculation that the controller could actually subsume the ADC functionality and obviate the need for one. I’ve discussed this with a number of vendors involved in SDN and I believe the likelihood of an SDN controller replacing an ADC is about as likely as Tim Tebow becoming a Pro Bowl quarterback.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: McAfee

The Significant Threat of Advanced Evasion Techniques
Advanced hacking methods, like advanced evasion techniques (AETs) have become more prevalent and harder to detect. Yet many network security vendors have downplayed the threat they pose as purely theoretical. Learn the false sense of security many IT professionals are under View Now

Cloud Security Priorities and Synergies with Enterprise Security
CISOs must prioritize identity, data security, and security monitoring, and strive for a "single-pane-of-glass" across enterprise IT, SaaS, PaaS, and IaaS Read More

'Unusual uptick' in attacks on media, publishing, Cisco says
'Dynamic DNS' also becoming exploited by cyber-criminals for botnet operations. Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. iPhone 6 rumor rollup for the week ending Aug. 1

2. 10 things you need to know about Microsoft's Surface Pro 3

3. Why TCP/IP is on the way out

4. Black Hat 2014: How to steal security codes from home alarm systems

5. PayPal's two-factor authentication is easily beaten, researcher says

6. 10 disturbing attacks at Black Hat USA 2014

7. 11 Big Data Certifications That Will Pay Off

8. Top 20 colleges for computer science majors, based on earning potential

9. The Linux desktop-a-week review: MATE

10. New products of the week 08.04.2014


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: