Search This Blog

Thursday, March 22, 2012

Biggest threat to corporate nets in 2011? Hactivists, not cybercriminals

  7 simple steps for thwarting hactivists | MIT camera uses laser technology to peek around corners
 
  Network World Network Optimization

Forward this to a Friend >>>


Biggest threat to corporate nets in 2011? Hactivists, not cybercriminals
Hactivists - not cybercriminals - were responsible for the majority of personal data stolen from corporate and government networks during 2011, according to a new report from Verizon. Read More


WHITE PAPER: APC

Classification of Data Center Management Software Tools
This paper divides the realm of data center management tools into four distinct subsets and compares the primary and secondary functions of key subsystems within these subsets. Learn More

RESOURCE COMPLIMENTS OF: Microsoft

Try Microsoft Office 365, free
Collaborate in the cloud with Office, Exchange, SharePoint, and Lync videoconferencing. Access, edit, and share documents. Starting at $8/user/month. Try it free.

7 simple steps for thwarting hactivists
More data was stolen from corporate networks last year by hactivists than by cybercriminals, according to a new report from Verizon. Read More

MIT camera uses laser technology to peek around corners
MIT Media Lab researchers this week have had a paper published in the journal Nature Communications in which they outline a camera they've developed that can essentially take pictures around corners. Read More

Browser survey puts Chrome in first place -- for just one day
Google's Chrome browser overtook Microsoft's Internet Explorer, all versions combined, to become the number one browser for a single day last weekend, according to figures from website analytics company StatCounter. Read More


WHITE PAPER: McAfee

Data Loss by the Numbers
This paper breaks down attack sources into four categories: external, malicious insiders, accidental insiders, and unknown. Breach categories are limited to areas that are most directly associated with data centers. View Now

Cisco's big comeback
Just a year ago, Cisco's stock was taking a beating after the sales failed to meet Wall Street expectations.The company wasn't exactly reeling, but CEO John Chambers knew something had to be done to right the ship. Read More

11 promising enterprise social networks
As the demand for enterprise collaboration continues to grow, more businesses are looking to internal social networks to manage workflow, foster collaboration and improve innovation. Read More

Cell-to-Wi-Fi roaming is on the way, but may come with a price
Getting your phone onto Wi-Fi networks may get a lot easier starting in about a year, but it won't necessarily get cheaper. Read More


WHITE PAPER: Raritan

Data Center Transformations
This paper discusses ways to simplify data center transformation and introduces a new process – BOCA – Build Outs, Consolidations and Acquisitions. Learn the five stages of BOCA and see how the right remote access and IT infrastructure management tools, deployed early and continuously monitored, can dramatically improve overall efficiency. Read now!

Mystery programming language in Duqu revealed
Last week, we highlighted the peculiarity of Duqu, a piece of malware security experts believe was coded by the same people who developed Stuxnet, the famed trojan which took measures to disrupt Iran's nuclear weapons program. Read More

Quantum unveils enterprise-class cloud backup services
Quantum has partnered with Xerox, which is using two new products for a cloud-based backup service. Read More

NEC to add mini earthquake sensors to its cloud-based device platform
NEC said Wednesday it will add small earthquake sensors to the growing set of devices that work on its cloud-based network platform. Read More

 
 
 

SLIDESHOWS

Review: Android-based Wi-Fi stumblers
Four easy-to-use wireless management and security tools that cost under $2.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Cisco helps users welcome BYOD
  2. Which smartphone apps are the biggest data hogs?
  3. LulzSec is back; Anonymous targets Imperva
  4. 11 promising enterprise social networks
  5. Apple denies new iPad overheating issues
  6. New iPad sales already top 3 million
  7. 'Surprise' Mac app quickly configures iOS devices
  8. Developer interest in Android slowly eroding, survey finds
  9. 9 classic computers that you can run on your Android device
  10. DARPA wants the ultimate technology, sensor network to monitor vast Arctic
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: