Search This Blog

Monday, February 23, 2015

You’ve been hacked. Now what?

  Antivirus software is falling behind the bad guys | 10 Reasons why the Raspberry Pi 2 Model B is a killer product

 
  Network World Network/Systems Management  

 

INSIDER
You've been hacked. Now what?
What should a company do after it's been hacked? It's a question Target, Home Depot, Sony Pictures Entertainment and others have had to ask over the past year or so. And it's likely that other organizations will be facing the same question over the coming months. (Insider Story) Read More

 


RESOURCE COMPLIMENTS OF: Ipswitch, Inc

9 Noble Truths of Network, Server and Application Monitoring
How can IT teams meet the need to thrive while dealing with an increasingly large and complex environment, constantly "doing more with less" and the requirements to deliver near-zero downtime? The nine noble truths of network, server and application monitoring explain the problem and describe the path to its solution. Click to continue

WEBCAST: IBM

The Mobile Experience - Increase Your Competitive Advantage
Download this half hour webinar to learn how to increase your competitive advantage using the latest in mobile technology design and trends. Best practices expert, Bill Loller, VP Mobile at IBM, will review what's wrong with the mobile customer experience today and what can be done to improve that experience. Learn More

Antivirus software is falling behind the bad guys
It can take up to six months for antivirus software vendors to catch a zero-day exploit, letting malware slip by en masse. Read More
 

10 Reasons why the Raspberry Pi 2 Model B is a killer product
The Raspberry Pi 2 Model B was recently released and it's quite a step up from its predecessors. Read More
 

Microsoft helps Lenovo, deletes Superfish 'crapware' and rogue cert
Microsoft updated its free Windows Defender and Security Essentials antivirus programs with a signature that sniffs out and deletes the rogue certificate linked to Superfish Visual Discovery, the 'crapware' that blew up in Lenovo's face. Read More
 


WEBCAST: IBM

What Does Customer Experience Mean for Your Social Business?
Respond promptly to customer needs. Make sure customer interactions are extremely tailored. Provide the right information to the right place at the right time. These are all the actions businesses must take to deliver a seamless customer experience. However, one person can't do it. It is even too much for one department. Learn More

 

INSIDER
New weapons offer hope against advanced cyber-attacks
One of the most frightening things about modern cyber-attacks is that a breach can remain undetected within networks for weeks, months or even years. This time gives hackers the luxury of lateral movement within a network, meaning they can acquire better credentials, compromise more systems and search for the most profitable and most damaging information. (Insider Story) Read More
 

 

With $15 in Radio Shack parts, 14-year-old hacks a car
A teenager not even old enough to drive a car was able to wirelessly connect to a vehicle's internal computer network and control various functions. Read More
 

Facebook, other tech firms face pressure from drivers over work conditions
Facebook and other tech companies in Silicon Valley are facing increasing pressure from its shuttle drivers to improve working conditions, amid concern about growing inequality in the area. Read More
 


WHITE PAPER: IBM

5 Tips for Success with Customer Analytics
Discover five tips for success with customer analytics, and how a better understanding of your customers in context increases revenue and deepens loyalty. Learn More

Apple, Linux, not Windows, most vulnerable operating systems in 2014; IE wins worst app
A whopping average of 19 security vulnerabilities were reported every day in 2014. The number of vulnerabilities discovered each year in operating systems, applications and hardware has skyrocketed in a nasty trend, according to analysis by GFI Software. Read More
 

UNICEF, Airtel team up in Africa to widen access to free health, data analysis apps
UNICEF has made its RapidPro suite of apps available to Airtel customers for free across the 17 African countries in which the telecom company operates. The open-source family of applications is designed to help governments deliver rapid and vital real-time information and connect communities to lifesaving services. Read More
 

Box buys Airpost, a startup that keeps tabs on cloud app use
Box has acquired Airpost, a startup that helps enterprises detect and manage the use of cloud applications by their employees. Read More
 

AppFutura: How to outsource mobile development
If you're a small company without developers or maybe a group within a large organization that can't get any love from the corporate development team and you need a mobile app, where are you going to go? Read More
 

 

SLIDESHOWS

Best open source monitoring tools

We found all four products to be capable network monitoring tools that performed well in our basic tasks.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Torvalds: 'People who start writing kernel code get hired really quickly"

2. Tens of thousands of home routers at risk with duplicate SSH keys

3. IBM busts the nasty myths of the millennial employee

4. Is the Samsung Galaxy S6 about to become the coolest Android phone ever?

5. You broke the network. Do you confess?

6. 15 cities that are hidden gems for tech job seekers

7. 5 tricks to improve poor TCP performance

8. HP latest to unbundle switch hardware, software

9. How Etsy makes Devops work

10. An LTE over Wi-Fi spectrum grab is coming


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: