Tuesday, February 04, 2014

Yahoo attack places spotlight on identity management

Target credential theft highlights third-party vendor risk | 13 Job Search Apps That Will Help You Get Hired

Network World Security

Forward this to a Friend >>>


Yahoo attack places spotlight on identity management
The attack on Yahoo that started with the theft of user credentials from a third-party database highlights the risk of sharing usernames and passwords across multiple websites. Read More


WHITE PAPER: Dell

Hybrid Cloud Computing
This white paper explores the vision and the reality of cloud computing, and assesses the requirements for effectively managing today's hybrid cloud environments. View Now

WEBCAST: VCE

Vblock™ Specialized System for SAP HANA®
Deploy SAP HANA® fast and with low risk. VCE brings together all of the necessary components for SAP HANA® into a single, standardized converged infrastructure system to ensure maximum performance at scale even with high data volumes. Learn More

Target credential theft highlights third-party vendor risk
Target's disclosure that credentials stolen from a vendor were used to break into its network and steal 40 million credit- and debit-card numbers highlights the fact that a company's security is only as strong as the weakest link in its supply chain. Read More

13 Job Search Apps That Will Help You Get Hired
13 Job Search Apps That Will Help You Get Hired Looking for a new job? In a market as competitive as IT you've got to be connected, organized and prepared. These apps will help you stay ahead of the curve wherever you are, so you never miss an opportunity. Read More


WHITE PAPER: 8x8, Inc

Scale Communications to Rival Big Companies
Small and midsize businesses looking to minimize telecommunications spending should consider a hosted UC service. This paper highlights: • How to offload significant upfront capital expenses • On-premise vs. cloud UC tradeoffs • Side-by-side pricing comparison of hosted UC service and IP PBX Learn more >>

Argonne lab grows Chia pet style hairy electronic fibers
Scientists at Argonne National Laboratory say they have created "hairy" electronic materials that grow like Chia pets. The Argonne researchers said they are interested in the tiny fibers for use in technologies like batteries, photovoltaic cells or sensors. Read More

12 predictions for the future of programming
If hitting a target is hard and hitting a moving target is even harder, then creating a new hit technology is next to impossible because the shape and nature of the target morphs as it moves. Think of building a swish new laptop just as laptops are heading out of favor, or a must-have mobile app just as smartphones plateau, or a dynamite tablet experience just as the wearable future takes hold. Read More


WHITE PAPER: Riverbed Technology

Path Selection Infographic
Path selection technology provides the ability to re-direct select traffic and application flows through alternate WAN routes based on service metrics, such as path availability and priority. View Now

Mobile users at risk from lack of HTTPS use by mobile ad libraries, security researchers say
Over the past several months security researchers have found serious vulnerabilities in many mobile advertising libraries that could be exploited to abuse the permissions of Android apps or to execute unauthorized code on users' devices. The risks resulting from those vulnerabilities would be significantly lower if those libraries would use HTTPS, security researchers said. Read More

Tor-enabled malware stole credit card data from PoS systems at dozens of retailers
Payment card data was stolen during the past three months from several dozen retailers that had their point-of-sale systems infected with a memory-scraping malware program called ChewBacca. Read More

Tech Salary Guide for 2014
If you work in the tech industry, the good news is that overall salaries are up year-over-year. But you're probably thinking, 'Fine, but what does that mean to me?' If you want to see where you fit, this IT salary guide covers every tech job from CIO to help desk professionals. Read More


SLIDESHOWS

Best tools for keeping end users happy

ExtraHop wins Application Performance Monitoring (APM) shootout.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Tech Salary Guide for 2014

2. MacGyver IT: 21 tools for IT heroes

3. Report has IBM looking to exit SDNs

4. Watch Apple's creepy follow-up to the 1984 Super Bowl ad

5. Cisco's SDN plan targets the WAN and access edge

6. Microsoft's long, messy, occasionally clumsy CEO search is about to end

7. Microsoft finally gets a clue: Boot to desktop as default in Windows 8.1 update

8. Hackers use a trick to deliver Zeus banking malware

9. How I fell back in love with GNOME

10. Leak hints Microsoft will recant 'make-them-eat-Metro' strategy for Windows 8


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment