Search This Blog

Friday, August 14, 2015

Prominent healthcare CIO: FDA medical device security warning "will be the first of many"

How to kill Remote Access Trojans | Ten scary hacks I saw at Black Hat and DEF CON

Network World Compliance

Prominent healthcare CIO: FDA medical device security warning "will be the first of many"
Dr. John Halamka has taken to his "Life as a Healthcare CIO" blog to sound the alarm on medical device threats in the wake of the FDA last week issuing its first cybersecurity warning about a specific medical device. Read More


Leveraging the Cloud for Your Social Business Workloads
Today, "social business" - a broad term that describes how social, mobile, and other technologies facilitate enhanced employee, customer, and partner engagement - has transformed the way we do business. Read this Frost & Sullivan whitepaper to learn why the cloud is one of the key reasons for this rapid transformation. Learn More

WHITE PAPER: Cisco Systems

Cisco ASA with FirePOWER Services
Meet the industry's first adaptive, threat-focused next-generation firewall (NGFW) designed for a new era of threat and advanced malware protection. Cisco® ASA with FirePOWER Services delivers integrated threat defense for the entire attack continuum - before, during, and after an attack. Learn More

How to kill Remote Access Trojans
Like their fleshy counterparts, RATs travel in packs, leading additional malware components to gather and reassemble themselves before launching the ultimate attack. Read More

Ten scary hacks I saw at Black Hat and DEF CON
While cyber security is increasingly important, researchers show how little of it we actually have Read More

Hackers show off long-distance Wi-Fi radio proxy at DEF CON
The device uses the 900 Mhz band but hides the data in the background radio noise Read More

DOJ calls for encryption balance that includes law enforcement needs
Companies encrypting customer data should weigh the benefits to cybersecurity against needs of law enforcement, officials say Read More

WHITE PAPER: Return Path

The DMARC Intelligence Report
Today, DMARC is the best remedy in the fight against phishing with the potential to nullify an entire class of fraud within the next few years. Learn which industries are early adopters, and which are failing to protect their brand and customers. Learn More

How Japan's Privacy Visor fools face-recognition cameras
The visor angles overhead light into cameras, confusing computer vision systems Read More

Cisco warns customers about attacks installing rogue firmware on networking gear
Compromised administrative credentials were used to flash malicious boot firmware on Cisco IOS devices Read More

It's alive! Patch Tuesday survives for Windows 10
Contrary to expectations earlier this year, Patch Tuesday survived the rollout of Windows 10. Read More

Threat intelligence needs to grow up
Security teams are overwhelmed with a massive amount of threat data. While a decade ago no one was talking about threat intelligence except government agencies, organizations are now bombarded with threat data leaving them challenged with identifying what is relevant. Read More


Identity as a Revenue Generator
Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and repeatable identity strategy. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers. Learn more >>

How texting a Corvette could stop it in its tracks
Third-party devices with cellular connectivity -- and security problems -- can tap into the heart of a vehicle's brain Read More

Mobile banking apps in developing nations have weak security
Attackers could already be using software vulnerabilities to steal money Read More

SEC charges 32 in press release hacking, stock trading scheme
The agency's move comes in addition to charges against nine defendants brought by the DOJ Read More

REVIEW: Email encryption has gotten so much better, so you'd be crazy not to use it
Hushmail, Virtru, HP Voltage, Datamotion, AppRiver, ProtonMail, Tutanova offer options for protecting emails from prying eyes. Read More


User guide to Windows 10

Windows 10 officially launches this week, so if you're going for an immediate upgrade from your Windows 7 or Windows 8/8.1 computer, this guide will get you up to speed as quickly as possible.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. 10 more fascinating things to do with a Raspberry Pi

2. Ten scary hacks I saw at Black Hat and DEF CON

3. Windows 10 is possibly the worst spyware ever made

4. FREE COURSE: Learn basic Cisco networking

5. Proposed solutions for fixing Reserve Windows 10 problems

6. iPhone 7 Rumor Rollup: A real release date! Plus, Apple puts kibosh on carrier scuttlebutt

7. 19 free cloud storage options

8. How to watch football: A guide to streaming the 2015 NFL, college football season

9. What exactly is big data?

10. Cisco warns customers about attacks installing rogue firmware on networking gear

Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **

No comments: