Monday, December 10, 2012

Security Data Explosion Is Driving Big Data Security Analytics

  Tor network used to command Skynet botnet | Traffic sensor flaw that could allow driver tracking fixed
 
  Network World Security

Forward this to a Friend >>>


Security Data Explosion Is Driving Big Data Security Analytics
In my last blog, I mentioned that44% of security professionals working at enterprise organizations (i.e. more than 1,000 employees) believe that security data collection and analysis could be considered "big data" today while another 44% believe that security data collection will qualify as "big data" within 2 years. Read More


RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Tor network used to command Skynet botnet
Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will adopt this approach, according to the team from vulnerability assessment and penetration testing firm Rapid7. Read More

Traffic sensor flaw that could allow driver tracking fixed
The sensor's maker said there was little risk to the public, but one expert said privacy concerns 'could certainly be valid' Read More


WEBCAST: VIPRE Antivirus Business

Mobile and Data Protection: Securing Today's Enterprise
Date: 12/13 at 2:00pm EST This webcast discusses the benefits and risks of today's mobile enterprise, patch management techniques, and how to secure your extended network environment. Learn More

Nationwide/Allied security breach highlights litigation fears
An insurance company data breach that exposed 1.1 million people to identity fraud exemplifies the kind of cybercrime that companies increasingly fear will land them in civil court. Read More

Gearhead: Weird Web Sites
Here are 10 fine examples of the madness of the Internet. Read More


WHITE PAPER: Dell SonicWall

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

US Congress passes another resolution opposing UN Internet takeover
The U.S. House of Representatives unanimously passed a resolution urging the U.S. government not to give the United Nations' International Telecommunication Union (ITU) control over the Internet. Read More

12 Scams of Christmas and How to Avoid Them
'Tis the season for online scams. Here are 12 of the most dangerous scams you're likely to see this holiday season. Read More

12 useful websites for IT security
From Microsoft and Cisco to the National Institute of Standards and Technology, we look at some of the most useful IT security websites Read More

Coming next season on The Walking Dead: Windows XP
Microsoft has said, repeatedly, that come April 8, 2014, it will end all support for Windows XP Service Pack 3. Support for SP2 and earlier have already ended. That means no bug fixes, no exploit fixes and no phone support. And in less than 500 days, that will be it for SP3 as well. And yet there are people who say Microsoft should wait. Read More

 
 
 

SLIDESHOWS

10 cloud predictions for 2013
2013 is the year that companies need to implement a serious cloud strategy that puts certain workloads in the public cloud and retains other workloads in-house.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Why did BlackBerry blacklist the 'Pooh' gang?
  2. What if Linux went closed source? Would you still use it?
  3. How the fiscal cliff affects IT
  4. Gartner: Amazon, HP cloud SLAs are 'practically useless'
  5. Government board aims to revamp decrepit U.S. security classification system
  6. 12 useful websites for IT security
  7. McAfee reportedly may have had a heart attack
  8. Gartner: Growth in cloud computing to shape 2013 security trends
  9. RIM offers free BlackBerry 10 smartphone
  10. 12 essential Windows 8 keyboard shortcuts
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment