Search This Blog

Friday, February 07, 2014

Target breach happened because of a basic network segmentation error

Secret Video and Audio Recordings a Legal Minefield for Employers | Experts warn of Russian spying, hackers at Sochi Olympics

Network World Security

Forward this to a Friend >>>


Target breach happened because of a basic network segmentation error
The massive data breach at Target last month may have resulted partly from the retailer's failure to properly segregate systems handling sensitive payment card data from the rest of its network. Read More


WEBCAST: VCE

Vblock™ Specialized System for SAP HANA®
Deploy SAP HANA® fast and with low risk. VCE brings together all of the necessary components for SAP HANA® into a single, standardized converged infrastructure system to ensure maximum performance at scale even with high data volumes. Learn More

WHITE PAPER: IBM

Geeknet: Business Analytics for Midsize Businesses
Business intelligence derived from sophisticated analytics has given large companies an edge for years. It helps them be more competitive, make information--‐based decisions faster and better, improves operational efficiencies, and boosts the bottom line. Midsize businesses are increasingly eager to reap similar benefits. Learn More

Secret Video and Audio Recordings a Legal Minefield for Employers
Thanks to smartphones and wearable technology such as Google Glass recording illegal or inappropriate conversations and behavior in the office couldn't be easier. If your company has a BYOD policy this could spell disaster. Read More

Experts warn of Russian spying, hackers at Sochi Olympics
Americans heading to Sochi, Russia, for the Winter Olympics are being warned that privacy is not a right in the host country and all their electronic communications will likely be monitored. Read More


WHITE PAPER: IBM

Cloud Changes the Game for Business Managers
In this paper, we explore midsize business challenges from the perspective, not of the IT department, but of the line of business managers they support. Using real-life use cases, we show how cloud services—and, in particular, the IBM SmartCloud offerings—can help midsize business managers reach their goals and transform the business. Learn More

EFF on cyber attack against hacktivists: CFAA for you; impunity for NSA and GCHQ
A secret GCHQ spy unit engaged in online attacks against the hacktivist groups Anonymous and LulzSec. Whether or not you support hacktivisim or believe Anonymous was in the right, one of the most worrying aspects to come out of the Snowden-leaked presentation is that if a non-government person were to have carried out such cyber attacks, then they could face jail time under the flawed Computer Fraud... Read More

Tumblr offers SSL option, but not default
Tumblr now allows users to encrypt their connections with the microblogging service, but the feature is only offered as an option for now. Read More


WHITE PAPER: Mitel Networks

Work 3.0: The Next Generation Model for Smarter Business
This paper explores the four critical elements that form today's working world -technology, physical location, working culture and business markets. Learn More

Increasing malware sophistication vexes lawmakers, industry
The failure of U.S. financial institutions and retailers to implement more robust cybersecurity measures, such as the smart-card technology widely used in Europe, was questioned and criticized by members of the U.S. Senate Judiciary Committee at a hearing Tuesday. Read More

Does your title match your authority?
Security executives have taken on much more responsibility and visibility in recent years as threats to corporate information assets and physical resources have increased. Read More

PCI security standard remains solid, chief says
The head of the organization in charge of maintaining security controls over credit card transactions insisted Monday that its standards remain solid despite the concerns raised by data breaches at Target and other companies. Read More


SLIDESHOWS

Best tools for keeping end users happy

ExtraHop wins Application Performance Monitoring (APM) shootout.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. So you think you know networking? Quiz II

2. Verizon denies throttling Amazon's cloud, Netflix services

3. Westmont College jumps to Gigabit Wi-Fi for three reasons: "Speed, speed and speed"

4. 6 things Satya Nadella should do right now

5. Review: Amazing Lenovo Miix 2 tablet is hobbled by Windows 8

6. Leaked features in Windows 8.1 Update 1

7. OpenDaylight: Where's the love?

8. 11 more oddball real-world tech job interview questions

9. 15 years on, Googlers reminisce about first data center

10. Dell commercial accidentally features XPS laptop running OS X


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: