Search This Blog

Wednesday, October 02, 2013

10 encryption tips for the enterprise

IE zero-day attacks to ramp up: Metasploit releases module | Forthcoming PCI changes will bring challenges for payment card network community

Network World Security

Forward this to a Friend >>>


INSIDER
10 encryption tips for the enterprise
Whether you're protecting corporate data from internal leakers, hackers looking to steal money from you and your customers, foreign spies, your own government, or employees accidentally leaving their laptops in a taxi, encryption is today's hot go-to tool. Read More


RESOURCE COMPLIMENTS OF: NeuStar

Hoping for answers on DDoS? Want to hear proven strategies?
Knowing is half the battle. Learn from experts in: • Government • Industry • Research & analysis Join us for DDoS Awareness Day From Hope to Strategy A live virtual event hosted by Neustar, sponsored by CSO │October 23, 2013 Register to Reserve Your Space Now

WHITE PAPER: Ipanema Technologies

Don't Let App Performance Problems Drag You Down
Check out this exclusive IDG-Ipanema survey to learn about the far-reaching impacts of poor application performance, and what you can do about it. Learn More.

IE zero-day attacks to ramp up: Metasploit releases module
Metasploit released a module for the IE zero-day vulnerability that has been exploited in the wild for the last three months, since at least July 1. Read More

Forthcoming PCI changes will bring challenges for payment card network community
Organizations that make use of SSH keys for secure access to servers should be aware that they may need to make some changes soon when it comes to managing any of their networks related to payment-card processing, according to the CEO of SSH Communications security, Tatu Ylonen. Read More


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

Many security professionals don't understand modern malware
Lack of knowledge leads to ineffective malware defenses and lengthy detection timeframes. Read More

Intel to acquire network security firm Sensory Networks
Intel has signed a deal to acquire Sensory Networks, a provider of software pattern matching technology for network security applications. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

10 Dumbest Things Tech CEOs Have Said and Done
As a rule, CEOs in the technology industry tend to be a pretty bright group. Their vision, passion and leadership have changed the world. BUT they also have moments that leave the rest of us wondering, "Are they really that dumb?" Read More

Public release of IE exploit could spark widespread attacks
An exploit for a vulnerability that affects all versions of Internet Explorer and has yet to be patched by Microsoft has been integrated into the open-source Metasploit penetration testing tool, a move that might spur an increasing number of attacks targeting the flaw. Read More

Former Qwest CEO out of prison, blames NSA for troubles
Revelations made by NSA leaker Edward Snowden would have given former Qwest CEO Joe Nacchio a fighting chance to beat insider-trading charges that garnered him a 70-month jail term, says Nacchio, who was released this month after serving four and a half years. Read More


SLIDESHOWS

iOS 7 tips and tricks you need to learn

Some advice on getting the most out of Apple's new mobile operating system, iOS 7.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. HP opens up on SDNs

2. Brute force malware targets email and FTP servers

3. Former Quest CEO out of prison, blames NSA for troubles

4. Cisco, Intel push 'trusted geolocation in the cloud'

5. BlackBerry responds to Gartner's call for clients to ditch BB products

6. 10 encryption tips for the enterprise

7. Ubuntu impresses in Linux enterprise server test

8. EMC bets big on flash storage

9. Cisco Nexus 9000 aimed at 40G?

10. 7 sneak attacks used by today's most devious hackers


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: