Search This Blog

Monday, November 18, 2013

Security Threat Landscape: Bad BIOS malware concept and CryptoLocker update

People's ignorance of online privacy puts employers at risk | The best data security offense is a good defense

Network World Security

Forward this to a Friend >>>


Security Threat Landscape: Bad BIOS malware concept and CryptoLocker update
Check out the latest episode of "Security Threat Landscape", a monthly video podcast co-produced by Network World and Fortinet. This month, Fortinet's Derek Manky and Network World's Keith Shaw (hey, that's me!) discuss the Bad BIOS Malware proof-of-concept (including a discussion of what an air-gapped network is), the Supermicro IPMI bug that in theory could attack BIOS-level control or servers at... Read More


RESOURCE COMPLIMENTS OF: IT Roadmap 2013

NEW: IT Roadmap Washington, D.C. is all new for 2013!
The content-rich agenda has been redesigned and reenergized to include increased IDG content from editors you know and trust and FIVE FOCUSED PILLARS OF TECHNOLOGY learning that are the most critical for the year ahead. Register now. Attend on December 12th. It's free!

RESOURCE COMPLIMENTS OF: SolarWinds

New Video: How to Configure NetFlow v9 on a Cisco Router
Networks can grow fast—really fast. This rapid growth leads to increased network traffic, more endpoints, and new IPs consuming bandwidth. Key to a complete understanding of network behavior at your growing organization is the ability to collect and analyze NetFlow data in your routers. SolarWinds new video shows you how, in less than 5 minutes! Looking to enable Flexible NetFlow on your Cisco routers? In less than 5 minutes, SolarWinds lead Sales Engineer demonstrates how to enable NetFlow v9 on Cisco routers with custom flow records. Watch the short how to video now!

People's ignorance of online privacy puts employers at risk
People say they are responsible for their own online safety, yet do very little to protect the information they share on social media, which increases the risks to themselves and employers, a study shows. Read More

The best data security offense is a good defense
After several missed security audits, the IT team at the Pennsylvania Department of Public Welfare jumped into action, building an ambitious security risk framework so audit reports could be prepared in a timely fashion. Read More


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

NASA, Boeing flaunt high-tech wing that could alter future aircraft design
NASA and Boeing this week showed off new technology that could go a long way toward reducing the size, weight and drag of future, greener aircraft. Read More

EU net neutrality proposal threatens privacy, says data protection supervisor
Europe's data protection watchdog on Friday said that plans for a European Union-wide net neutrality law do not protect citizens' rights to privacy. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Holiday gift guide 2013 [2013 Cool Yule Tools]
The holidays are here, and it's time to rock! With more than 140 products to choose from, let us take you on a journey through our favorite personal technology products and gift ideas for the techie on your list. From phones to computers to the hottest video games, we've got a bunch of great gift ideas. Please peruse and share with friends and family! Read More

Lavabit-DOJ dispute zeroes in on encryption key ownership
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud. Read More

CIA collecting in bulk data on international money transfers, say reports
The U.S. Central Intelligence Agency secretly collects data in bulk on international money transfers, under a program similar to the government's collection of phone records, according to reports. Read More

IT budgets, salaries & priorities: 2013 SIM IT Trends Study
Highlights from annual Society for Information Management survey of CIOs and other senior IT leaders Read More


SLIDESHOWS

Recent iOS app updates people hate

We looked at the top 100 iPhone and iPad apps in the Business category, free or paid, that were last updated in September or October 2013 to find the ones users HATE.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. US intelligence wants to radically advance facial recognition software

2. Amazon bashes private clouds, launches virtual desktops

3. 12 hot security start-ups to watch

4. Microsoft: No, we're not ditching on-premise Exchange

5. New Juniper CEO: Meet the real Shaygan Kheradpir

6. Nexus 5 is designed to work on Verizon Wireless, and most other networks

7. Juniper taps new CEO with CIO roots

8. Verizon: LTE service didn't keep up with demand

9. Cruise line plans 11ac network upgrades for stem-to-stern Wi-Fi

10. Wikileaks releases draft of long-secret trade proposal


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: