Search This Blog

Friday, November 14, 2014

Why bug bounty hunters love the thrill of the chase

  Hot products from AWS: reInvent | Cisco funds university research into VoIP security

 
  Network World Compliance  

Why bug bounty hunters love the thrill of the chase
Bounty hunters in the law enforcement field are often thought of as these long haired, wild men who will do whatever it takes to track down the person who has run afoul of the law. Bug bounty hunters perhaps have the same passion for tracking down code-based flaws, but you would be hard pressed to pick them out of a lineup. Instead of tracking down perpetrators, bug bounty hunters are tracking down any vulnerabilities in companies' sites.It's not often that you get to hack into live websites without the threat of the law. Jonathan Singer, a security engineerTo read this article in full or to leave a comment, please click here Read More
 


WEBCAST: Flexera Software
 
How to Say Goodbye to Windows Server 2003
Organizations need to adopt a repeatable, sustainable pattern for dealing with operating system obsolescence. Redmond Magazine's "Decision Maker" columnist, Don Jones, and Tim Davis from Flexera Software discuss how organizations can start creating a consistent Application Readiness process that will serve for decades to come. Learn More>>

WHITE PAPER: Flexera Software
 
Six Steps to Continuous Application Readiness
This paper outlines the six key steps of an Application Readiness process, and explains how Flexera® Software's solutions, AdminStudio Suite and App Portal, can reduce the risk and cost of ongoing service transitions by providing a consistent approach to delivering application services on a regular basis. Learn More>>

Hot products from AWS: reInvent
As the show gets rolling this week, here are some of the products on display Read More
 

Cisco funds university research into VoIP security
Cisco It's understandable why Cisco Systems would fund university research into VoIP security: The vendor has a lot at stake if customers lose faith in the technology.The company is right up there with Microsoft atop the broader unified communications and collaboration market, as measured by the likes of Synergy Research and Gartner.To read this article in full or to leave a comment, please click here Read More
 

New products of the week 11.10.2014
Our roundup of intriguing new products from companies such as Skyera and Mocana Read More
 

First Stuxnet victims were five Iranian industrial automation companies
To reach the uranium enrichment plant at Natanz, Stuxnet's creators likely targeted Iranian companies tied to it, researchers said Read More
 


WHITE PAPER: OPSWAT Inc.
 
Secure the Use of Portable Media in Critical Infrastructure
Securing critical infrastructure is crucial to ensuring that our current way of life is sustained. Our whitepaper provides insight into the development of strong security policies around the use of portable media, and how to effectively mitigate the threat from external sources. Learn more

 

INSIDER
Nasuni raises the bar for hybrid cloud storage
  As growth in cloud-based storage products continues to accelerate, enterprise vendors have taken cloud storage to the next level. The hybrid model, which utilizes both local and offsite storage, offers organizations a way to more seamlessly scale up and manage large amounts of data with a single-vendor service.To read this article in full or to leave a comment, please click here(Insider Story) Read More

 

FTC chair wants clearer disclosures to protect privacy
Many consumers are in the dark on how their data is used, the regulator said Read More
 

US concerns about online privacy present opportunity, experts say
Internet companies will move toward offering more privacy-enhancing tools, some privacy advocates say Read More
 

Google warns of deadly manual account hijacking attacks
Maximum damage, difficult recovery Read More
 


: Fortinet

The Increasing Requirements for Data Centers
In this Infonetics Research report, Principal Analyst, Jeff Wilson, discusses the data center market and adoption drivers for firewalls, integrated security, and other appliances. View Now>>

Sophos CEO: We're betting entirely on the cloud
Ease of management is the key for small business IT staff Read More
 

US weather agency confirms cyberattack
NOAA shut down some services for unscheduled maintenance after four websites were compromised Read More
 

Microsoft fixes critical crypto flaw, strenghtens encryption for older systems
A vulnerability in the Microsoft SChannel component could expose servers to remote code execution attacks Read More
 

Adobe fixes eighteen vulnerabilities in Flash Player
  Fifteen of them are critical and can result in remote code execution Read More
 

Home Depot says attackers stole a vendor's credentials to break in
It also disclosed 53 million email addresses were stolen Read More
 

 

SLIDESHOWS

Ten operating systems for the Raspberry Pi

The OSes the Raspberry Pi can run will amaze you!

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Peeping into 73,000 unsecured security cameras thanks to default passwords

2. Black Friday iPhone 6, iPad Air deals spill forth from Walmart

3. Black Friday deals from Target, Best Buy on iPhones, iPads

4. November 2014 Patch Tuesday: Microsoft released 4 critical fixes, 14 total updates

5. Inside look: How to land on a comet

6. Alcatel-Lucent virtualizes WANs and routers

7. Black Friday sales promise iPhone 6 deals

8. Microsoft reveals Windows 10's administrative features

9. Juniper needs to get it right this time

10. Google's super-secret process for finding potential employees


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: