Wednesday, November 14, 2012

NSA: Looking for a few good cybersecurity professionals

  Firefox turns 8 and gets a key security boost | The Elections and Cybersecurity
 
  Network World Security

Forward this to a Friend >>>


NSA: Looking for a few good cybersecurity professionals
At a time when cyberattacks on America's critical infrastructure have increased 17-fold (between 2009 and 2011), the need for highly trained cybersecurity professionals is acute. However, 83% of federal hiring managers in a recent survey said it was extremely difficult to find well-trained cybersecurity professionals and a projected shortfall of 20,000 to more than 40,000 people is expected in the years to come. Read More


RESOURCE COMPLIMENTS OF: SolarWinds

82% of data breaches can be identified prior to a compromise
Knowing that your next threat may already be hiding in your logs doesn't help without powerful log and event analysis to help you find them. Safeguard your network, systems, and security infrastructure against today's threats with a proactive defense strategy using SolarWinds LEM. *Source: Verizon Business, Data Breach Investigations Report. Cover Your IT Assets by Downloading a Free Trial of Solarwinds Log & Event Manger Today!

RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

Firefox turns 8 and gets a key security boost
Between Android and Firefox, this has been a big week for milestones in the world of free and open source software. Read More

The Elections and Cybersecurity
When President Obama was reelected last week, political pundits quickly turned to speculation and prognostication. Was the president's reelection tantamount to a mandate? Would the election motivate both parties away from partisanship toward more cooperation? Good questions and very timely in light of the oft mentioned "fiscal cliff" we face in January. Given my particular focus, I immediately... Read More

Firefox users slowest to update browser, Kaspersky Lab finds
Nearly 1 in 4 PC users run out-of-date or obsolete versions of the most popular browsers for a month or longer with Mozilla Firefox users the slowest to update their software, Kaspersky Lab has found. Read More


WHITE PAPER: FireEye

Intensified Dangers of Email-Based Attacks
Keep your organization safe by staying educated. Download this report to learn more about identifying and preventing cyber attacks. Learn more.

Shareholders kept in the dark on data breaches
It happened more than three and a half years ago. So it presumably would be old news that Chinese hackers broke into soft drink behemoth Coca-Cola's computer systems and stole confidential files relating to its effort to acquire the China Huiyuan Juice Group for $2.4 billion. But it is just coming to light now. Read More

How to Secure Big Data in Hadoop
The promise of big data is enormous, but it can also become an albatross around your neck if you don't make security of both your data and your infrastructure a key part of your big data project from the beginning. Here are some steps you can take to avoid big data pitfalls. Read More

The Gibbs Golden Turkey Awards nominations: Vote early, vote often!
This November marks the ninth year for which we will be announcing the Gibbs Golden Turkey Awards ... Read More


WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Live Webcast: Thursday November 29th at 2:00pm Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Ransomware crooks make millions from porn-shaming scams
Ransomware is a growth industry that puts at least $5 million a year into criminals' coffers, according to Symantec. Read More

Adobe Reader X sandbox bypassed by zero-day flaw
Criminals have gained access to a newly discovered flaw in Adobe's Reader X program that can beat its sandboxing security isolation technology, Russian security firm Group-IB has claimed. Read More

NASA fires-up experimental space Internet for robot control
NASA said today it had teamed with the European Space Agency to successfully test an experimental version of an "interplanetary Internet" to control a robot on the ground in Germany from a laptop onboard the International Space Station. Read More

 
 
 

SLIDESHOWS

How to set up secure Wi-Fi for BYOD
QuickConnect and XpressConnect offer cloud-based methods to automate BYOD client configuration and connection.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Antivirus pioneer John McAfee reportedly wanted for murder in Belize
  2. Microsoft shocker: Windows 8 chief Steven Sinofsky out
  3. The 10 most powerful supercomputers on the planet
  4. Facebook crowd adds insult to Romney's injury
  5. Palo Alto Networks targets VMware shops with virtualized next-gen firewalls
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. 2013 IT salaries: 15 titles getting the biggest pay raises
  8. OpenFlow startup takes aim at Cisco, VMware
  9. How to earn a living making Open Source software
  10. 6 tools to manage large file transfers
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment