Monday, April 28, 2014

Data breach report: 9 attack patterns describe 92% of 100,000 security incidents

Cloud computing confronts critical crossroads | Online black market designed to evade feds

Network World Voices of Networking

Forward this to a Friend >>>


Data breach report: 9 attack patterns describe 92% of 100,000 security incidents
There are some big changes to Verizon's 2014 Data Breach Investigations Report (DBIR) (pdf), including a deep dive into two different datasets that came from 50 different sources and 95 countries. One set of data looks back at 1,367 confirmed data breaches and 63,437 security incidents from 2013. Another looks back over a decade of data covering about 3,800 data breaches and 100,000 security incidents.... Read More


WHITE PAPER: Dell Software

Best Practices Guide for IT Governance & Compliance
Federal regulations require businesses to know exactly what changes are made to structured and unstructured data within their corporate networks. Learn how the best practices for implementing a compliance solution in this white paper can help you minimize stress during your next IT compliance audit. Read now!

WHITE PAPER: Dell Software

Proven Approaches to Mobile-Enable Enterprise Apps
What's the best way to provide your diverse mobile users access to the apps they need? This white paper explains how the Dell Application Modernization and Development Solution Set can help you know when to develop new mobile apps, modernize existing apps or set up a desktop virtualization solution. Learn more

Cloud computing confronts critical crossroads
It's been an amazingly busy period for the cloud computing industry. A multitude of powerful forces – both positive and negative – are simultaneously buffeting the industry, and their combined effects could dramatically affect the landscape for both consumer and enterprise users of cloud computing services. Read More

Online black market designed to evade feds
A new plan to perpetuate the online black market takes an approach that aims to make it more difficult for federal law enforcement to interfere. Read More

Enterprises Need Outside-In Continuous Monitoring for Risk Management
Ask any CISO what their job entails and they are likely to respond with a common mantra: Assess IT risk, communicate IT risk to business executives, and then create and execute a mutually agreed upon plan to address risk. In the past, CISOs concentrated this effort on internal IT but this internal focus is becoming increasingly myopic because: 1. Outsiders have network access. Enterprises... Read More


WHITE PAPER: Network Instruments

The Hidden Costs of APM
APM solutions can deliver relevant network visibility and help to prevent problems before they negatively impact the business. But which solution is best for your organization? With this white paper, you will learn key questions to ask your vendor to ensure that you are getting the best value for your investment. Learn More

How F5 Networks countered the Heartbleed bug
Over the last few weeks, the security industry has been rocked by the Heartbleed bug, which impacted OpenSSL-based websites. Heartbleed takes advantage of an OpenSSL feature called heartbeat, which exchanges data between the user's computer and the webserver. Heartbleed causes the web server to send back a massive amount of data, rather than only the data it's supposed to, including sensitive,... Read More

WLAN Testing and Benchmarking: Notes from Syracuse University
My old friend and colleague David Molta invited me to speak in a couple of his classes at Syracuse University. Dave, whom I first met when he was spending his time at Network Computing, is one of truly great professionals in the networking (wireless and otherwise) space, and now devotes his days (and many evenings) to inspiring the next generation of experts as an Associate Professor of Practice in... Read More

Why cloud companies are watching the Aereo, Supreme Court case very closely
The U.S. Supreme Court this week heard arguments in a case involving Aereo, a startup that allows users to access broadcast television networks without paying big-brand cable companies expensive contracts. Cloud storage services are wrapped into this case as well though because Aereo uses hosted servers to store the content, giving its customers the ability to stream it on demand. Read More


WHITE PAPER: CDW

Software License Management Best Practices
This software license reference guide provides an in-depth look at the impact of mobile apps, virtualization, cloud computing, SaaS and more. Learn the best practices to cost-effectively account for the new technology landscape while ensuring software license compliance. Read Now

Leaker claims Microsoft will give away free cloud-based Windows for PCs & laptops
Wzor, the infamous Windows leaker, took to a forum with claims that Microsoft is allegedly working on a prototype operating system that would not be fully functional unless it was connected online to the cloud. You better sit down, because rumor has it that some minimalistic version of this new Windows OS, which may be meant for devices with screens larger than 9 inches, could be "free." Read More

Useful Gadget: A keyboard for where you can't swing a cat or a mouse.
Read More

Wearable computing devices: Can they pass the acid test?
I've been reading and writing technology product reviews far longer than I'd like to admit. Read More

Juniper opens arms to OpenDaylight
Juniper has submitted a plugin for its open source SDN controller to the OpenDaylight Project, an effort Juniper's a member of but has publicly dismissed. Read More


SLIDESHOWS

10 Big Data startups to watch

These 10 startups to watch were chosen based on third-party validation, experience, and market potential.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Whatever happened to the IPv4 address crisis?

2. California bill proposes mandatory kill-switch on phones and tablets in 2015

3. ATM malware, controlled by a text message, spews cash

4. 16 weirdest places you'll find Linux

5. 28 facts about pi that you probably didn't know

6. 12 free cloud storage options

7. Top 20 colleges for computer science majors, based on earning potential

8. 8 free Wi-Fi stumbling and surveying tools

9. IRS misses XP deadline, pays Microsoft millions for patches

10. How to change Windows 8.1 to local account with no Microsoft email account required


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_voices_of_networking as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment