Search This Blog

Friday, May 15, 2015

Beware the ticking Internet of Things security time bomb

Old-school anti-virus vendors learn new tricks | Sally Beauty confirms second payment card breach

Network World Compliance

Beware the ticking Internet of Things security time bomb
IBM’s Andy Thurai didn’t quite put the words into former RSA CTO Deepak Taneja’s mouth, but did prompt him by asking at the start of a TIE Startup Con panel in Cambridge, Mass., earlier this month whether Internet of Things security is a “time bomb ready to explode.” Read More


IBM i2 Enterprise Insight Analysis for Cyber Intelligence
Don't let cyber criminals steal your data, exploit your resources or damage your reputation. Learn how IBM i2 Enterprise Insight Analysis can help you fortify your cyber security measures by uncovering hidden connections and threats, buried in disparate data sets, in near real-time. Learn More


Infographic - Big Data is the New Natural Resource
With POWER8, multiple business users looking to find answers amongst vast amounts of data at the same time are not slowed down or constrained. Check out this infographic to learn more. Learn More

Old-school anti-virus vendors learn new tricks
In an era when businesses are scrambling to defend against sophisticated advanced persistent threats, old school anti-virus may seem like a relic. But traditional anti-virus companies are changing with the times, delivering defense-in-depth for a BYOD world.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Sally Beauty confirms second payment card breach
There's enough evidence to confirm an intrusion, but the scope of the breach is not yet clear Read More

Five tips to comply with the new PCI requirements
At the end of June, merchants that accept payment cards have five new security requirements to comply with -- and significant fines and other costs if they don't Read More

Critics blast NSA phone records bill as 'fake reform'
Even some supporters say the USA Freedom Act should be only one step toward surveillance reform Read More


Why Security Analysts Can't Live Without Big Data
The next generation security analyst at your organization needs a tool that delivers security analytics on big data. Read this ebook to learn how Platfora enables analysts to detect root causes, and unearth larger cyber attacks. Learn more

The Cloud Computing Security Challenge
Cloud computing's virtual, mobile, and on-demand nature is antithetical to existing security processes, skills, and technologies Read More

Review: 10 JavaScript editors compared
JavaScript programmers have many good tools to choose from -- almost too many to keep track of. In this roundup, I discuss 10 text editors with good support for developing with JavaScript, HTML5, and CSS, and for documenting with Markdown. Why use an editor for JavaScript programming instead of an IDE? In a word: speed. To read this article in full or to leave a comment, please click here(Insider Story) Read More

8 cloud companies to watch following MONSTER funding week
Investors this week poured at least $350 million into cloud computing companies focused on everything from security to Hadoop clusters to industry-specific apps. Read More

United launches bug bounty, but in-flight systems off limits
United will give loyalty miles as a reward instead of cash for finding flaws in its websites Read More

WHITE PAPER: VMware | Lenovo

Simplifying Storage Scalability with VMware Virtual SAN
This paper describes the power of Virtual SAN on Lenovo's System x3550 and x3650 (M4 and M5) rack servers and the Flex System x240 and x240 M5 blade servers. View now

Google cripples all Chrome add-ons from outside its app store
Google took a final step in its years-long scheme to aggressively lock down Chrome by crippling all add-ons because of abuse of a loophole left in the rules last year.On Wednesday, Google began requiring all extensions, also called add-ons, to originate from the Chrome Web Store for all builds of the Windows browser. The Chrome Web Store is Google's official distribution channel for Chrome and Chrome OS add-ons, apps and themes.ALSO ON NETWORK WORLD: Google Graveyard: Here's what Google has killed The same restriction will take effect on Chrome for OS X in July.To read this article in full or to leave a comment, please click here Read More

Billions of reasons to listen to these Unicorn startup founders
Bob Brown/NetworkWorld TIE Startup Con "Unicorn" panel (L-R) Moderator Deepak Sindwani of Bain, WeWork co-founder Miguel McKelvey, Actifio CEO Ash Ashutosh Unicorns are all the rage these days, and we’re not talking about the ones in fantasy stories or on your kids’ bedspreads. The unicorns that people at events like last week’s TIE Startup Con (formerly TIEcon East) are agog over are private companies with valuations of $1 billion or more, such as co-working office space provider WeWork and data virtualization company Actifio, whose founders talked shop during the opening panel at the Cambridge, Mass., get-together for entrepreneurs and investors.To read this article in full or to leave a comment, please click here Read More

Google killing PageSpeed website service
Google Google has alerted users of its PageSpeed Service for making websites zippier that it will be killing off the tools as of Aug. 3.The company, which this week introduced a new offering called Cloud Bigtable for storing large amounts of data online, apparently has bigger things to worry about these days.To read this article in full or to leave a comment, please click here Read More

Tech's highest paid CEOs
The median pay for CEOs at 50 tech companies was $11.5 million in 2014, according to Network World's analysis of compensation packages.To read this article in full or to leave a comment, please click here(Insider Story) Read More


Inside CEO paychecks

Who got raises, who took cuts, and who knocked Larry Ellison off his perch as highest paid tech CEO.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. What if Windows went open source tomorrow?

2. Beware the ticking Internet of Things security

3. The best way to protect passwords may be creating fake ones

4. Inside CEO paychecks

5. Digging Deeper into the Cisco ASA Firewall REST API

6. 9 Common Spanning Tree Mistakes

7. 12 free cloud storage options

8. Cisco packing lots into new Catalyst Ethernet switch

9. Peeping into 73,000 unsecured security cameras thanks to default passwords

10. The five coolest projects at AT&T Labs

Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **

No comments: