Search This Blog

Friday, November 15, 2013

Businesses offer best practices for escaping CryptoLocker hell

10 mistakes companies make after a data breach | 12 hot security start-ups to watch

Network World Compliance

Forward this to a Friend >>>


Businesses offer best practices for escaping CryptoLocker hell
It is an IT nightmare: Businesses hit with the CryptoLocker malware find their electronic files locked up inside strong encryption and the extortionist operating the malware botnet demanding money to give them the security key that would let companies get their data back. Read More


WHITE PAPER: Ipanema Technologies

Don't Let App Performance Problems Drag You Down
Did you know: 73% of enterprises lose productivity due to poor application performance? And that's just the beginning of the issues resulting from poor application performance. Check out this exclusive IDG-Ipanema survey to learn about the far-reaching impacts of poor application performance, and what you can do about it. Learn More.

In this Issue


WEBCAST: Egnyte

Consider Hybrid Approach to File-Sharing
Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with short videos, white papers and demos. View Now!

10 mistakes companies make after a data breach
Michael Bruemmer, vice president of Experian Data Breach Resolution, outlines some the common mistakes his firm has seen as organizations deal with the aftermath of a breach during a presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy. Read More

12 hot security start-ups to watch
Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, Calif.-based Illumio, for example, founded earlier this year, is only hinting about what it will be doing in cloud security. But already it's the darling of Silicon Valley investors, pulling in over $42 million from backer Andreesen Horowitz, General Catalyst, Formation 8 and others. Read More

INSIDER
Strategic guide to backup and recovery
Your company is increasingly reliant on IT to drive business, so the need for a sound backup and disaster recovery plan has taken on increased significance. At the same time, technologies such as the cloud are giving IT new options for how to deal with backup and DR. Read More

iPhone 5, Galaxy S4 zero-day exploits revealed at HP Pwn2Own contest
Two teams of Japanese "white hat" hackers have been declared victors at HP's Pwn2Own 2013 contest in Tokyo today for finding zero-day exploits that allowed them to compromise the Apple iPhone 5 and the Samsung Galaxy S4. Read More

IBM acquires Fiberlink as mobile-security strategy keystone
IBM Wednesday announced an agreement to acquire Fiberlink Communications, saying the purchase is a key part of a broader mobile-security strategy to provide assurance in transactions conducted via devices such as iPhones and Android smartphones. Read More


WHITE PAPER: AT&T

Managing Mobile Access to the Cloud
Use of mobile personal cloud services is proliferating on personal and enterprise-owned mobile devices. Organizations are considering controls that appear to conflict with the spirit of BYOD and wonder if their approach is correct. Learn More

New Juniper CEO: Meet the real Shaygan Kheradpir
From FiOS to the CIO Hall of Fame to Twitter: Kheradpir makes for an interesting choice by Juniper. Read More

Weak global economy contributed to $112 billion loss from retail theft
High unemployment and lower wages were major contributors to an uptick in retail crime last year that cost the industry more than $112 billion worldwide, according to the latest global theft report. Read More

Microsoft Patch Tuesday advisories urge ditching old, weak crypto algorithms
Microsoft patched serious vulnerabilities Tuesday in Windows, Internet Explorer and Office, but also urged customers to stop using the aging RC4 cipher and SHA-1 hashing function in their systems and services. Read More

Microsoft opens headquarters for digital crime fighters
Cybersleuths on the trail of botnets, Trojans and other malware used to steal financial assets and intellectual property have a new resource, a Microsoft facility that it will share with others pursuing the same goals. Read More

Hackers compromise 860,000 MacRumors forum accounts
The estimated 860,000 users of the popular MacRumors web forum have been told to change their passwords immediately after hackers successfully compromised an admin account in order to steal personal and login data. Read More


WHITE PAPER: Novell

Mobile Zen: Balancing End-User Productivity and IT Control
Mobility is often seen as a zero-sum game: either end users or IT can win, but never both. Learn how users can have the convenience and mobile productivity they need, while IT retains control over enterprise goods. Victory for both sides. Learn More

Research shows arms dealer used in cyberespionage attacks
Companies battling tireless cyberespionage campaigns may be up against well-organized attackers that are fed a steady stream of malware from a talented developer of cyber-arms. Read More

Start-up Adallom takes on SaaS security monitoring/auditing
Start-up Adallom today introduced a cloud-based offering intended to help enterprises better monitor, audit and control use of software-as-a-service (SaaS) applications by employees. Read More

Start-up Sideband Networks models live network traffic to spot trouble
Start-up Sideband Networks today came out of stealth mode with an appliance that it says can model live traffic to give visibility into applications and user devices in order to solve performance problems. Read More

Georgia Tech warns of emerging threats in cloud, mobile
Companies will face next year emerging threats in cloud data storage that will demand security measures that go far beyond what is offered by service providers, a university report says. Read More

Arbor Networks introduces cloud-based anti-DDoS service
Arbor Networks today introduced its first cloud-based distributed denial-of-service (DDoS) mitigation service to protect enterprises against large-scale attacks intended to swallow up available bandwidth or knock application servers offline. Read More

Products of the week 11.11.13
Our roundup of intriguing new products from companies such as Radware and NetMotion Read More


SLIDESHOWS

Recent iOS app updates people hate

We looked at the top 100 iPhone and iPad apps in the Business category, free or paid, that were last updated in September or October 2013 to find the ones users HATE.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. US intelligence wants to radically advance facial recognition software

2. Amazon bashes private clouds, launches virtual desktops

3. 12 hot security start-ups to watch

4. Microsoft: No, we're not ditching on-premise Exchange

5. New Juniper CEO: Meet the real Shaygan Kheradpir

6. Nexus 5 is designed to work on Verizon Wireless, and most other networks

7. Juniper taps new CEO with CIO roots

8. Verizon: LTE service didn't keep up with demand

9. Cruise line plans 11ac network upgrades for stem-to-stern Wi-Fi

10. Wikileaks releases draft of long-secret trade proposal


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: