Thursday, April 25, 2013

Feds' EINSTEIN intrusion detector raises serious privacy questions

  Amazon looks to move security appliances to the cloud, says CISO | Infosec 2013: There is no such thing as information security risk
 
  Network World Security

Forward this to a Friend >>>


Feds' EINSTEIN intrusion detector raises serious privacy questions
Department of Homeland Security is preparing to deploy a much more powerful version of its EINSTEIN intrusion-detection system that can capture e-mail content and personally identifiable data Read More


RESOURCE COMPLIMENTS OF: Global Knowledge

2013 IT Skills and Salary Report – Just Released!
Download your free copy of the 2013 IT Skills & Salary Report published by Global Knowledge and Windows IT Pro to learn how your salary, job satisfaction, and other factors compare to your peers. Included is detailed salary information on some of the most popular security certifications including: CISSP, CEH, CISA, Security+, and more. Download Now

WHITE PAPER: Aerohive

Wireless LAN: Preferred Enabler of BYOD
Bring Your Own Device (BYOD) and its array of wireless devices is becoming the dominant way workers access corporate networks . And it's forced IT leaders need to reexamine how to best provide secure, reliable and cost-effective wireless network access. Read Now

Amazon looks to move security appliances to the cloud, says CISO
Amazon Web Services (AWS) is looking to expand its security offerings with hosted intrusion protection appliances and more extensive encryption features, as it looks to increase the level of protection users can get in its cloud. Read More

Infosec 2013: There is no such thing as information security risk
There is no such thing as information security risk, according to Serge Baudot, head of information security and business continuity management at easyJet. The only risk that matters within any organisation is the risk to the bottom line. Read More

Verizon report: China behind 96% of all cyber-espionage data breaches
Verizon's 2013 Data Breach Investigation Report is out and includes data gathered by its own forensics team and data breach info from 19 partner organizations worldwide. The report covers about 621 confirmed breaches and about 47,000 security incidents that occurred in 2012. Security incidents do not necessarily mean the attackers were able to breach an organization and could include DoS attacks. Read... Read More


WEBCAST: Trusteer

Security Requirements vs. Operational Challenges
In this webinar, guest speaker Rick Holland, senior analyst serving Security & Risk Professionals at Forrester Research, Inc., will discuss the security and operational challenges associated with advanced malware protection. Learn More.

FireEye finds Gh0stRAT cyberespionage campaigns continue
A well-known cyber-spying tool called Gh0st RAT is still being employed in stealthy malware attacks, according to a new report from security firm FireEye. Read More

Recently patched Java flaw already targeted in mass attacks, researchers say
A recently patched Java remote code execution vulnerability is already being exploited by cybercriminals in mass attacks to infect computers with scareware, security researchers warn. Read More

IBM robotic coworker will help engineers fix broken systems
When it comes to fixing broken systems, especially in remote locations, engineers could soon turn to a new mobile robotic system IBM is developing that could help them more easily find the broken equipment, offer up information about the system and provide real-time visual support from supervising experts. The mobile maintenance, repair and operations prototype includes an application that lets a supervisor... Read More


WHITE PAPER: Tripwire

10 Steps to Risk-based Security Management
Many professionals in information security espouse the belief—and commitment to—"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Learn More

Hacktivists take on 'Olympus Has Fallen' scare tactics style
Twitter is a great place if you want news that is so red-hot off the press that the e-ink is still wet. But with the likes of the Syrian Electronic Army hijacking Twitter accounts and tweeting disastrous fake news as if Olympus Has Fallen is a reality and not a movie, Twitter is finally going to implement two-factor authentication. Read More

More malware discovered from drone cyberattacks
Researchers following a cyberespionage campaign apparently bent on stealing drone-related technology secrets have found additional malware related to the targeted attacks. Read More

Serious flaw present in latest Java Runtime Environment for desktops and servers, researchers say
Java vulnerability hunters from Polish security research firm Security Explorations claim to have found a new vulnerability that affects the latest desktop and server versions of the Java Runtime Environment (JRE). Read More

Assess risk before you ascend to the cloud
Risks to moving a company's data to a cloud provider are significant, but manageable, according to report released Tuesday by an international cybersecurity association. Read More

 
 
 

SLIDESHOWS

25 weirdest things in the 'Internet of Things'

The Internet is slowly creeping into every part of our lives, so much so that it's becoming easier to look around the house and find objects that can be connected to the Internet.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. What the man behind HP's new internal IT plan has in mind

2. Juniper switching boss talks technology challenges, Cisco Nexus 6000

3. Cisco nemesis Huawei retreating from the U.S.

10. 'Good enough' Microsoft Hyper-V starts turning more heads

9. Chinese cyber-espionage rising, says Verizon annual report

6. What's your obsolete tech really worth on eBay?

5. 25 weirdest things in the 'Internet of Things'

4. 12 Linux nerds you should follow

7. Top SSL VPN tools

8. 6 fresh Apple iPhone 6, iOS 7 concept designs

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment