Thursday, March 27, 2014

14 Mobile Certifications That Meet IT Demands

Network World Security - Newsletter - networkworld.com
Cybersecurity Expert and CIO: Internet of Things is 'Scary as Hell' | 11 Tips for Working With IT Recruiters

Network World Security

Forward this to a Friend >>>


14 Mobile Certifications That Meet IT Demands
Mobile technologies are increasingly important to organizations of all sizes, but how can you best prepare your workforce? Find out which of these 14 vendor-specific and vendor-neutral mobile IT certifications -- from app development to security -- are the most valuable to your employees. Read More


WHITE PAPER: Sophos, Inc.

Advanced Persistent Threats: Detection and Protection
In this paper we'll explain how a multi-faceted approach to protect against APTs including layers of defense can reduce the risk of attacks. Learn More

RESOURCE COMPLIMENTS OF: CSO40 Security Confab + Awards Conference

FINAL DAYS to Register: CSO40 Security Confab + Awards
Please join us this March 31 – April 2, 2014 for CSO40 Security Confab + Awards. Our program of fast-moving, rapid fire presentations delivered by leading CSO and CISO thought leaders demonstrate how forward-thinking organizations are embracing today's challenges and preparing for the future. Register now.

Cybersecurity Expert and CIO: Internet of Things is 'Scary as Hell'
The terms "Internet of Things" (IoT) and "connected home" are two of the trendiest buzzwords in the technology world today. And while both clearly offer very real potential, they also introduce their own share of risk, particularly if they're not approached with caution, according to Jerry Irvine, an owner and CIO of IT outsourcing services firm, Prescient Solutions. Read More

11 Tips for Working With IT Recruiters
IT is, by its nature, a technical, fast-paced and many times specialized industry. The necessary skills for career advancement are constantly evolving. With legacy systems, changing business goals and the constant march of new technology, companies are hard-pressed to find the necessary talent to keep their organization growing. Read More

Office for iPad could have security implications both good and bad
Microsoft is widely expected to announce Office for iPad tomorrow, which could have both positive and negative security implications for businesses that use it, experts say. Read More


WHITE PAPER: IBM

AIIM SharePoint Industry Watch
AIIM surveyed its 65,000 community members to look at how the enterprise is reacting to social aspects, why organizations are exploring social, who is for and against the adoption of social. Learn More

Full Disclosure security mailing list reborn under new management
The recently closed Full Disclosure security mailing list, which served as an open discussion forum for security researchers since 2002, was replaced Tuesday with a new list that will serve the same purpose, but will require former members to resubscribe. Read More

Gameover malware targets accounts on employment websites
A new variant of the Gameover computer Trojan is targeting job seekers and recruiters by attempting to steal log-in credentials for Monster.com and CareerBuilder.com accounts. Read More

NTSB reminds pilots to land at correct airport
There are a ton of details involved in flying an aircraft no doubt but you might think landing at the correct airport would be one of those things that just wouldn't be a serious problem. Well I guess we'd be wrong on that score because today the National Transportation Safety Board has issued a Safety Alert to remind pilots to um, land at the right airport. Read More


WHITE PAPER: HP and Intel® Xeon® processors

HP BladeSystem Leadership and Innovation for Data Centers
In Gartner's 2013 Blade Server Magic Quadrant, HP has been positioned as a leader for completeness of vision and ability to execute. Read this paper to learn why HP BladeSystem is the leading choice of IT professionals. Learn More

Latest Word zero-day similar to exploits in other targeted attacks
Exploits aimed at the recently discovered zero-day vulnerability in Microsoft Word are similar to those used last year by hackers suspected of gathering intelligence for nation states or private companies, a researcher says. Read More

HOCO CISO program breaking ground with "virtual" CISOs
It may not be a revelation that security isn't a top priority for many organizations, but what about those companies that want to have a full-time CISO and simply cannot afford it? Enter the CISO "in residence" program in Howard County, Maryland. Read More

Newest bug bounty touts $10K rewards, appeals for help in finding Flash flaws
A new entry in the cash-for-bugs business, the Internet Bug Bounty, recently paid out its first $10,000 rewards. Read More


SLIDESHOWS

3D printing: How does it really work?

Here are the nine most common 3D printer technologies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. ATM malware, controlled by a text message, spews cash

2. Melissa virus turning 15 … (age of the stripper still unknown)

3. 5 free Ethernet tools you should check out

4. (Free!) Security Tools you should try

5. FIRST LOOK: The HTC One M8 smartphone

6. Spherix sues Cisco for 'immense' patent infringement

7. 12 signs Apple is bringing an iWatch to market

8. 3D printing: How does it really work?

9. Free data science courses from Johns Hopkins, Duke, Stanford

10. Trial Microsoft software and services - for FREE!


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment