Search This Blog

Friday, September 05, 2014

Home Depot breach could be largest ever

New products of the week 09.02.2014 | Why hackers may be stealing your credit card numbers for years

Network World Compliance

Home Depot breach could be largest ever
It looks like Home Depot may have earned the dubious distinction of being responsible for the biggest compromise ever involving credit and debit card data. Read More


WHITE PAPER: Kaseya

Managing the Complexity of Today's Hybrid IT Environments
There are many factors driving the complexity of IT today, each making it harder for organizations to get their hands around IT. Read this whitepaper to learn how to address the 3 key factors driving change in IT today. Learn more!

: RMG Networks

Visualizing Gamification with Intelligent Digital Signage
When designed and implemented correctly, gamification in business can help businesses motivate performance and increase productivity. Learn More. Learn More

New products of the week 09.02.2014
Our roundup of intriguing new products from companies such as HP and WTI Read More

Why hackers may be stealing your credit card numbers for years
Hackers may have the upper hand for years as the retail industry slowly upgrades its systems, analysts said Read More

11 open source security tools catching fire on GitHub
Malware analysis, penetration testing, computer forensics -- GitHub hosts a number of compelling tools for securing computing environments of all sizes Read More


WHITE PAPER: OPSWAT Inc.

Secure the Use of Portable Media in Critical Infrastructure
Securing critical infrastructure is crucial to ensuring that our current way of life is sustained. Our whitepaper provides insight into the development of strong security policies around the use of portable media, and how to effectively mitigate the threat from external sources. Learn more

"Outraged" Apple issues update on celebrity cellphone nude photo breach
Apple has issued a statement regarding the hacking of dozens of celebrities' cellphones that exploded over the weekend as actual and fake nude photos spread across the Internet. Read More

DOJ, intelligence official support bill ending bulk phone collection
The Senate is likely to vote on a pumped-up version of the USA Freedom Act this fall Read More

Verizon settles FCC consumer privacy investigation
The company failed to notify telephone customers that they could opt out of targeted marketing campaigns, the agency said Read More


WHITE PAPER: OpenMarket

How CIOs Can Guide the Enterprise to Mobile Success
In this paper we look at the new, front-line role of IT and security, specifically within enterprises using mobile messaging technologies, and suggest ways to mitigate risk and avoid costly mistakes and pitfalls. View Now>>

Hillary Clinton: 'Our technology companies are not part of our government'
US companies are being unfairly tarred for perceived cooperation with the government, she said Read More

Skyhigh Networks provides first stop in cloud security
A file sent from a mobile device to Box can first be inspected by Symantec, McAfee, EMC RSA data-loss prevention systems. Read More

The Russian-made tool that grabs nude selfies from iCloud accounts
Elcomsoft said it is aware pirated copies of its Phone Password Breaker software are circulating in the underground Read More


SLIDESHOWS

The new Microsoft under Satya Nadella

The Microsoft CEO has set new goals, taken some decisive actions, moved ahead with works already in progress and made Wall Street happy.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Internet of Overwhelming Things

2. Data shows Home Depot breach could be largest ever

3. Cisco retools UCS server line

4. Bypassing hardware firewalls in 20 seconds

5. Facebook blamed for driving up cellphone bills, but it's not alone

6. Container party: VMware, Microsoft, Cisco and Red Hat all get in on app hoopla

7. "Outraged" Apple issues update on celebrity cellphone nude photo breach

8. Top 20 colleges for computer science majors, based on earning potential

9. Surface Pro 3: A great business desktop and a pretty good laptop, too

10. First Look: Samsung's Note 4, VR and more


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: