Search This Blog

Friday, August 07, 2015

Harvard CISO shares 5 pearls of IT security wisdom

Sorriest technology companies of 2015 | FREE COURSE: Hack yourself first (before the bad guys do)

Network World Compliance

Harvard CISO shares 5 pearls of IT security wisdom
Chief Information Security Officer Christian Hamer, who is responsible for policy and awareness across Harvard University and whose team handles security operations and incident response, took part on a panel last week at the Campus Technology conference in Boston. Here's a selection of Hamer's more notable observations: Read More


WHITE PAPER: Centrify Corporation

Eight Great Reasons to Use Centrify with Office 365
We're bringing you eight great reasons to use Centrify with Office 365. Centrify Identity Service is an Identity-as-a-Service (IDaaS) solution that federates user identity from Active Directory, LDAP directories, or the Centrify Cloud Directory. View Now>>

WHITE PAPER: Cisco Systems

Cisco ASA with FirePOWER Services
Meet the industry's first adaptive, threat-focused next-generation firewall (NGFW) designed for a new era of threat and advanced malware protection. Cisco® ASA with FirePOWER Services delivers integrated threat defense for the entire attack continuum - before, during, and after an attack. Learn More

Sorriest technology companies of 2015
A rundown of the year in apologies from tech vendors and those whose businesses rely heavily on tech. Read More

INSIDER
FREE COURSE: Hack yourself first (before the bad guys do)
In partnership with tech training provider Pluralsight, Computerworld offers a free online course. Learn how to think like a hacker, and use some of the tools they do, to find the security holes in your websites before a breach occurs. (Insider - free registration required.) Read More

Android device makers to release monthly security fixes
They're starting now with a fix for a major vulnerability called Stagefright Read More

Tech industry objects to terrorist activity reporting section in US legislation
Industry groups have asked the Senate to delete the section which requires them to report vaguely-defined terrorist activity Read More


WHITE PAPER: Return Path

The DMARC Intelligence Report
Today, DMARC is the best remedy in the fight against phishing with the potential to nullify an entire class of fraud within the next few years. Learn which industries are early adopters, and which are failing to protect their brand and customers. Learn More

EFF-led group wants to give do-not-track some bite
The initiative is the first credible attempt to define what "do not track" actually means, according to backer Read More

Senate heads toward vote on CISA cyberthreat info sharing bill
A preliminary vote on the controversial bill could happen as soon as Wednesday Read More

Sick of Flash security holes? HTML5 has its own
Web browsers and HTML5 technologies bring their own weaknesses to the world of Internet apps Read More

Black Hat: Hackers urged to protect Internet freedom
Security researchers need to fight for the rights to study, modify and reverse engineer Internet hardware and software or the general population risks losing Internet freedom, the Black Hat 2015 conference was told. Read More


WHITE PAPER: IBM

Information Governance Best Practices
When should you implement integration governance? According to this Gartner research note, you should start now if you are an IT professional considering an initiative like master data management (MDM), e-discovery, information archiving or cloud migration. Learn More

ICANN resets passwords after website breach
No financial information was affected, the organization said Read More

FBI warns businesses of spike in email/DDOS extortion schemes
The report comes from the FBI's partner, the Internet Crime Complaint Center (IC3) which stated that victims that do not pay the ransom receive a subsequent threatening e-mail claiming that the ransom will significantly increase if the victim fails to pay within the time frame given. Some businesses reported implementing DDoS mitigation services as a precaution. Read More

INSIDER
Understanding and using objects in PowerShell
One of the things most people do not realize about PowerShell, at least up front, is that PowerShell is based on the .NET Framework, which means that PowerShell can be considered a programming language. In fact, each response you get from running a cmdlet in PowerShell, no matter how simple or complex that cmdlet may be, is actually a .NET object. It might look like text to you, but it can be programmatically manipulated in ways that Linux and UNIX command line diehards can only dream about.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Attackers could use Internet route hijacking to get fraudulent HTTPS certificates
There's no easy fix, a security researcher said at the Black Hat security conference Read More


SLIDESHOWS

How much do CIOs really make? Pay packages of 25 Fortune 500 execs revealed

Compensation for CIOs includes cash, equity, perks.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Windows 10 is possibly the worst spyware ever made

2. SDN switches aren't hard to compromise, researcher says

3. Black Hat: Hackers urged to protect Internet freedom

4. Proposed solutions for fixing Reserve Windows 10 problems

5. How to set up a local account in Windows 10 during or after installation

6. Tweaks to Windows 10 settings for privacy

7. Windows 10 installation: Customize settings vs. express settings

8. 19 free cloud storage options

9. Microsoft will NOT email you Windows 10, it's ransomware

10. FBI warns businesses of spike in email/DDOS extortion schemes


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: