Search This Blog

Tuesday, September 02, 2014

Tool scans SMB websites for malware and vulnerabilities and automates remediation

Why Russian hackers are beating us | VMware calls new "hyper-converged" system a building block for software-defined data centers

Network World IT Best Practices

Tool scans SMB websites for malware and vulnerabilities and automates remediation
This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Cyber attackers will do whatever it takes to exploit vulnerabilities and plant malware that might eventually allow them to infiltrate an unsuspecting user's computer. From there it's easy to gain entry to the corporate network where the hacker can cause all kinds of havoc.One hacking technique pervasive today is to corrupt a legitimate website and plant malware that is poised for download whenever an innocent visitor comes visiting. According to Google, almost 10,000 websites a day are infected with malware that is intended to harm site visitors. Websense claims that 85% of all malicious web content is hosted on legitimate websites that have been hacked.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Instart Logic

Boost Conversions and Deliver High Definition Experiences
Download this whitepaper to discover Instart Logic's radical new approach to delivering web and mobile sites that reduce wait time, enables high-resolution images, and more. Learn More>>

WHITE PAPER: Instart Logic

Overcome Web Performance Obstacles for SaaS Applications
Learn about the technology that powers and speeds up the web experiences of hundreds of thousands of enterprise SaaS application users, over Instart Logic's innovative global network. Learn More

Why Russian hackers are beating us
Russian hackers like the ones who breached the computer systems of JP Morgan Chase and at least four other banks win because they think strategically like the best chess players, an expert says."Russians are more intelligent than Americans," Tom Kellermann, chief cyber-security officer for Trend Micro, said. "They're more intelligent because they think through every action they take to a point where it's incredibly strategic.[Ukraine says Russia is attacking critical infrastructure]To read this article in full or to leave a comment, please click here Read More

VMware calls new "hyper-converged" system a building block for software-defined data centers
SAN FRANCISCO – VMware this week unveiled at its VMworld event the first in a family of “hyper-converged” systems, a product called EVO:RAIL that it says will help customers build software-defined data centers. The product combines compute, network and storage functionality in a single appliance, and comes in a standard 2U form factor with four nodes. + MORE VMWORLD: VMware takes its best shot at the cloud | Hot products from VMWorld 2014 +To read this article in full or to leave a comment, please click here Read More

INSIDER
The care and feeding of a rockstar developer
Developers rule in the current tech landscape and have their choice of prime positions at any number of major companies. They appear to be on a promised path, with companies fighting for their services. The world is their oyster, so it seems.To read this article in full or to leave a comment, please click here(Insider Story) Read More


: IBM

IBM Advanced Case Management Knowledge Vault
Empower your knowledge workers to deliver better case outcomes. Visit the IBM Advanced Case Management Knowledge Vault to learn more. Learn More

Toss routers with hardcoded passwords, expert says
Sometimes it is best to toss security-challenged technology, and that's the recommendation experts are giving to small businesses using a flawed router from a China-based manufacturer. Read More

Virtual Engineers Could Transform IT Outsourcing
Before Marcel Chiriac took over as CIO of Rompetrol two years ago, the European oil company's IT sourcing strategy had swung back and forth between total insourcing and total outsourcing. And both models failed.All of IT was handled in-house from 2004 until 2009. During that period, IT costs grew rapidly along with the size of the company. In an attempt to remedy the situation, the management team decided to outsource all of IT to a single company for a flat multibillion-dollar fee. It was a from-the-frying-pan-into-the-fire shift as the outsourcing provider overcharged for work beyond the contract scope and subcontracted Rompetrol's IT support to more than 100 other IT suppliers adding complexity to the environment.To read this article in full or to leave a comment, please click here Read More

INSIDER
IT Resume Makeover: How to Avoid Buzzword Burnout
Christopher White's resume was crammed with buzzwords, jargon and what executive resume writer, social media and career strategist Donald Burns calls “techno-gibberish.”To read this article in full or to leave a comment, please click here(Insider Story) Read More


: RMG Networks

Visualizing Gamification with Intelligent Digital Signage
When designed and implemented correctly, gamification in business can help businesses motivate performance and increase productivity. Learn More. Learn More

The must-have utilities for your iPad office
The 10 tools you must have on your iPad for business Read More

Key factors to consider when evaluating video conferencing
Simplicity, reliability, scalability and security are core considerations, but when it comes to questions about cost, take into account what you'll miss if you decide not to deploy. Read More

Top things to consider as you prepare for the transition to 802.11ac Gigabit Wi-Fi
Overlay or rip and replace? Site survey or wing it? Need to upgrade the links to the APs? What about monitoring and management? Read More


SLIDESHOWS

12 oddball odes to open-source

Hey, I just met you / and this is crazy / but here's my pub key / so msg me maybe.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Internet of Overwhelming Things

2. The Linux Desktop-a-week Review: elementary OS's Pantheon

3. Heading back to school? Try these 11 terrific tech tools.

4. Red Hat CTO abruptly resigns

5. Hot products at VMworld 2014

6. Top things to consider as you prepare for the transition to 802.11ac Gigabit Wi-Fi

7. One frustrating Linux problem that Windows, Mac users don't deal with

8. What Apple can do to improve the iPhone 6 display

9. Juniper CEO on IoT, co-creation and the IOP

10. The 10 best laptops of 2014 (so far)


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: