Friday, September 07, 2012

Insider security threat gets a serious look by US security agencies

25 of today's coolest network and computing research projects | Windows 8 'doesn't move the needle' on security, says Symantec

Network World Security

Forward this to a Friend >>>


Insider security threat gets a serious look by US security agencies
Interesting study out today that took an in-depth look at 80 insider security cases and developed patterns of behavior that could help private companies, government, and law enforcement more better prevent, deter, detect, investigate, and manage this devious problem. Read More


WHITE PAPER: PhoneFactor

Malware Threats Force Authentication to 'Step Out' Of Band
Malware, like ZeuS and other real-time attacks, has rapidly outpaced all other banking security threats to defeat most security measures in place today. This whitepaper examines these current malware threats and today's best practices for mitigating them, such as out-of-band authentication and transaction-level verification. Learn More

WHITE PAPER: Blue Coat Systems

Optimize and Secure Cloud, SaaS, BYOD, and Social Media
Today's threat landscape has migrated to the web causing many security professionals to prevent direct Internet access at the branch. But with new cloud-based security solutions from Blue Coat you can re-architect your network to embrace the Internet – safely – and optimize application performance. Learn more.

25 of today's coolest network and computing research projects
University labs, fueled with millions of dollars in funding and some of the biggest brains around, are bursting with new research into computer and networking technologies. Read More

Windows 8 'doesn't move the needle' on security, says Symantec
Symantec said Windows 8 "doesn't move the needle much" on security as it rolled out new versions of its antivirus software and promised to provide users with several so-called "Modern" apps for the new operating system. Read More


WHITE PAPER: Solutionary, Inc.

Defending Against Advanced Persistent Threats
Organizations of all sizes need to be aware of the risks posed by Advanced Persistent Threats (APTs) and take appropriate steps to protect sensitive data. This white paper provides an overview of APTs, examples and steps for defending against them as well as case studies that detail actual attacks. Learn more.

Virus infects a banking Trojan, leaving both operative
When malware infects a machine it usually goes after the system software. But in a rare case worked on by SpiderLabs, researchers found a Trojan that had been infected by a virus, leaving both still functioning as normal. Read More

The 12-fold path to IT failure
These "industry best practices" are sure to sink your chances of IT success Read More


WHITE PAPER: IBM

Consolidating & Retiring Applications
The process of the integration and governance of information provides a framework that incorporates acquisition, organization, control and use of information to create and enhance business value. Learn More.

4 security suites that protect all your devices
Security suites from McAfee, Symantec, Trend Micro and Webroot offer protection for all your devices along with Web-based management. Read More

CipherCloud widens cloud-based encryption options
CipherCloud this week broadened its encryption gateway support to include support for Microsoft's SharePoint, as well as the services Yammer and SAP's SuccessFactors. Read More

PWC: No evidence of breach in Romney tax return extortion case
PricewaterhouseCoopers said Wednesday it has not found evidence of unauthorized data access despite a group's claim that Republican presidential candidate Mitt Romney's tax returns were stolen in a late-night office theft. Read More



SLIDESHOWS

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more
Before their corporate jobs, many tech CEOs got their hands dirty, scrubbing oils stains off asphalt, cleaning bathrooms, and shoveling monkey cages. Here are their stories.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 12 hot cloud computing companies worth watching
  2. Great tech for $25 or less: affordable-gadget roundup
  3. Most wild, wacky & wonderful Wi-Fi installations
  4. The case for LTE: 4 reasons why you need 4G
  5. No evidence of breach in Romney tax return extortion case
  6. Desktop Linux is dead? I thought it was thriving
  7. Motorola announces new Droid Razr smartphones
  8. Cisco, HP switching share down in Q2
  9. Android: Everyone's favorite new malware target
  10. Linux Mint 13 leaves sour aftertaste

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment