Search This Blog

Monday, June 08, 2015

After breaches, higher-ed schools adopt two-factor authentication

Researchers debunk marketers' claims that Americans are cool with trading their data | What network technology is going to shake up your WAN?

Network World Network/Systems Management

INSIDER
After breaches, higher-ed schools adopt two-factor authentication
Payday didn't go as planned on January 2, 2014, for some Boston University employees. On that day, about a dozen faculty members discovered their paychecks hadn't been deposited into their bank accounts. Thieves had changed the victims' direct deposit information and rerouted their pay. BU's IT security team traced the attack to a phishing email sent to 160 people at the university. (Insider Story) Read More


WHITE PAPER: Aerohive

Rethinking Enterprise Wireless Networks
This paper from IDC explores the trends, challenges, and solutions that the latest generations of WiFi architecture deliver. View Now>>

: Scribe Software

Maintain Flexibility While Integrating Data
As Dynasplint Systems, Inc. (DSI) contemplated the need to integrate its order-entry system with its CRM system so sales could generate activity reports in real time, the company sought an integration solution that would allow both systems to run separately. Learn More

Researchers debunk marketers' claims that Americans are cool with trading their data
You know those reports citing surveys that found U.S. consumers are fine with having their personal data collected so long as giving up that data means consumers get discounts? Well that's a bunch of bunk perpetrated by marketers who are opening up Americans to exploitation, according to a new report from the University of Pennsylvania's Annenberg School for Communication. Read More

What network technology is going to shake up your WAN?
Few areas of the enterprise are as ripe for change as the wide area network. And there are plenty of technologies – from hybrid WAN services and software defined networking to better management tools -- lining up to push such a makeover closer to reality. Read More

For its next feat, Google will try to make you eat your vegetables
If your image of the Google cafeteria is a bunch of portly coders tucking into steak and lobster every night, think again: Silicon Valley's cream of the crop is going on a diet. Read More


WHITE PAPER: GT Nexus

The Procure-to-Pay Process
Manufacturers seek new ways to partner with suppliers to ensure their health, strong performance and optimal delivery of inventory. IDC points out that P2P is a key step in achieving these goals by enabling better planning, execution and access to capital for suppliers. View now>>

Iowa presidential election caucuses will go high tech
There are some things that are uniquely American, like apple pie, fireworks on the Fourth of July ... and the ridiculous hoopla that surrounds the Iowa caucuses, the first big electoral event in the run-up to the presidential election. Read More

Tools for downloading Web sites for OS X, Linux, and Windows
The other day I was checking out an excellent free book, Python for Informatics: Exploring Information by Charles Severance, which is available on the site PythonLearn. .I decided to download the sample code from the book but, unfortunately, the samples are in about 65 individual files as well as five subdirectories which, in turn, each contain around half a dozen files. Sitting there and manually downloading each file wasn't something I particularly wanted to do so I looked for a tool to do the job for me and I've come up with a couple of interesting choices. Read More

Closing the security loop with automated incident response
Organizations have poured billions of dollars into cyber security detection solutions, and while they are exceptional at uncovering potential anomalies and threats, none of these products can guarantee against a breach. Consequently, the next logical step is to pair robust detection and prevention technology with equally efficient and effective operations solutions, including incident response. Read More


: Open Text

How Businesses Connect, Communicate, and Collaborate
Whether you're new to EDI, need to get EDI-compliant or simply want to educate your business colleagues, EDI Basics provides an easy-to-understand explanation of the fundamental concepts. View Now.

INSIDER
Threat intel sharing: Security breakthrough or flavor of the month?
Threat intelligence sharing has become the 'new black' in the world of enterprise security, a trendy buzzword that has become ubiquitous at industry conferences and in vendor marketing pitches. But what exactly is threat intelligence sharing and are we using it effectively to defend against cyberattacks? (Insider Story) Read More

DARPA spends $24M to smarten-up WAN edge
Officials of the Defense Advanced Research Projects Agency (DARPA) this week awarded two contracts worth a total of nearly $24 million to develop new networking and security technologies at the WAN edge. Read More

INSIDER
5 Wi-Fi stumblers and analyzers for less than $100
Wi-Fi stumblers and analyzers are a must-have when troubleshooting Wi-Fi interference and performance issues, or when simply checking channel usage on the wireless bands. They're also needed for Wi-Fi site surveys during the network design and deployment phases, as well as for security audits to look for rogue or misconfigured access points. (Insider Story) Read More


SLIDESHOWS

Windows 10: Which classic Microsoft default apps should be killed?

Based on what we've seen in Microsoft's Windows 10 preview editions, here's our take on which classic apps should be kept and which should be killed when the final version of Windows 10 ships.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Intel Security scares ransomware script kiddie out of business

2. Cisco announces new CEO's executive team, more departures

3. Yahoo does Spring Cleaning: Shuts down Maps, Pipes & more

4. US reports massive breach of government personnel data

5. What apps sell or steal your data or take over your phone? PrivacyHawk can tell you

6. Does Fortinet's Meru buy mean we're in for even more Wi-Fi industry consolidation?

7. Google kicks Google+ off its homepage

8. 7 free Wi-Fi stumbling and surveying tools for Windows and Macs

9. Shopping for 802.11ac Wave 2 Wi-Fi? Don't rush into it

10. Reserve your free Windows 10 upgrade, download available on July 29


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: