Friday, April 25, 2014

Verizon: Web apps are the security punching bag of the Internet

Here's how Apple is spending $1 billion on sapphire | Cisco announces security service linked with new operations centers

Network World Compliance

Forward this to a Friend >>>


Verizon: Web apps are the security punching bag of the Internet
Verizon today issued its annual data-breach investigations report, a study of what happened in 1,367 known cases across dozens of industries in 95 countries last year, and the most common form of attack was breaking in through Web applications. Read More


WHITE PAPER: Spirent

Top 5 Reasons You Need Network Testing NOW
The availability, security, and performance of applications and services on the network are among the most important aspects of an IT organization, and must be tested to ensure performance. Download this white paper to learn the top 5 reasons why you should test your network sooner rather than later. Learn More

WHITE PAPER: Dell Software

Optimization Strategies to Better Support Mobile
Grow your mobile workforce without risking security or increasing administrative complexity. This new white paper explains how Dell Mobility Solutions can help you increase mobile/BYOD performance and capacity while protecting company resources and streamlining IT management. Learn more

Here's how Apple is spending $1 billion on sapphire
From rare gemstone to mass market material for future iPhones, iPads and more? Read More

Cisco announces security service linked with new operations centers
Cisco today announced Managed Threat Defense, a set of security services for the enterprise that Cisco is providing through two new operations centers to remotely support intrusion-detection, incident response and forensics, among other services. Read More

Fave Raves: 33 tech pros share favorite IT products
It takes many tools to keep IT systems running smoothly, and tech pros have their personal favorites. What made the cut? Everything from security products and mobile device management tools to data analytics and cloud services. If your favorite tech product didn't make the list, tell us about it. Read More

China working on Linux replacement for Windows XP
China is working on a Linux operating system that can replace the now-vulnerable Windows XP and protect the country's networking infrastructure. Read More


WHITE PAPER: CDW

Why Partner With a SAM Provider?
As IT infrastructures evolve, the complexity of software assets is constantly increasing, creating headaches for IT pros whose responsibility it is to keep track of it all. In response, many are turning to software asset management (SAM) software. View Now

Hundreds of medical professionals targeted in multi-state tax scam
Medical professionals in ten states have become victims of identity theft, after someone used their personal information, including Social Security Number, to file fraudulent tax returns. Read More

How a cyber cop patrols the underworld of e-commerce
Melissa Andrews, a resident of Canada, is a cyber security "cop" for Payza, an international e-commerce payment platform operating in 97 countries. Her job, described by the company's public relations firm as "the worst security job on the Internet," is to protect the public from illegal, and many times revolting, content, by shutting the sites down and alerting authorities about criminal activity. She spoke with CSO this week about her job and why she is proud of what she does. Read More

The Internet of Things: An exploding security minefield
Everybody from the Federal Trade Commission (FTC) to a unanimous crowd of security experts has been issuing increasingly insistent warnings that security is not being taken seriously in the explosive development of the Internet of Things (IoT). Read More

NSA spying revelations have tired out China's Huawei
Revelations about U.S. secret surveillance programs have left China's Huawei Technologies exhausted on the public relations front, a top company executive said Wednesday. Read More


WHITE PAPER: Attachmate

Mobile-Enabling Your Workforce with Apps You Already Have
Learn how Verastream can unlock your legacy assets and make them seamlessly accessible to your mobile audience. An advanced technology tool and mobile-enablement platform, Verastream can quickly package your applications and data into any format, for any device. Learn More!

Self-taught hackers rule
Ilio Kolochenko, CEO of High-Tech Bridge, a Swiss information security company, gave the keynote address on governments' role in cybersecurity this past Sunday at the Regional cybersecurity Summit in Oman. Read More

Cloud Attacks Are Following Enterprise Workloads
Enterprise workloads are shifting to cloud and hosting environments in ever greater numbers and attacks that have historically targeted on-premises environments are following them, according to a new report. Read More

How to keep your smartphone (and its data) secure
In our daily activities, our smartphones increasingly store or access sensitive business and personal data -- not just email, but also financial and medical information, company systems, travel itineraries, etc. Many of us also use smartphones to access cloud data repositories like Dropbox, Evernote, Google Docs, Microsoft OneDrive and Apple iCloud. Read More

Michaels says breach at its stores affected nearly 3M payment cards
About 2.6 million payment cards at Michaels Stores and another 400,000 at subsidiary Aaron Brothers may have been affected in a card skimming attack that compromised its point-of-sale systems, the retailer said Thursday. Read More

What the rumor mill expects from iOS 8
Mobile payments, smarter Siri, better maps and more Read More


SLIDESHOWS

10 Big Data startups to watch

These 10 startups to watch were chosen based on third-party validation, experience, and market potential.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Whatever happened to the IPv4 address crisis?

2. California bill proposes mandatory kill-switch on phones and tablets in 2015

3. ATM malware, controlled by a text message, spews cash

4. 16 weirdest places you'll find Linux

5. 28 facts about pi that you probably didn't know

6. 12 free cloud storage options

7. Top 20 colleges for computer science majors, based on earning potential

8. 8 free Wi-Fi stumbling and surveying tools

9. IRS misses XP deadline, pays Microsoft millions for patches

10. How to change Windows 8.1 to local account with no Microsoft email account required


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment