Search This Blog

Thursday, June 05, 2014

Researchers urge hackers to exploit Hyper-V's huge attack surface

  Comcast to start encrypting email traffic with Gmail in the coming weeks | GnuTLS library flaw could expose SSL clients, systems

 
  Network World Security

Forward this to a Friend >>>


Researchers urge hackers to exploit Hyper-V's huge attack surface
Read More
 


WHITE PAPER: Dell SecureWorks
 
Advanced Threat Services
This white paper defines advanced threats, reviews the types of techniques advanced threat actors use as they relate to the kill chain, recommends specific steps for an effective defense strategy and defines how Dell SecureWorks services can help organizations detect, defend and eradicate advanced threats. Learn more

WEBCAST: Dell SecureWorks
 
Counterstrategies for Combatting Social Engineering
Social Engineering is proving costlier than ever, especially phishing and spear phishing. With recent breaches, the imperative to counter social engineering effectively takes on a whole new level of urgency. In this webcast, the CISO for Dell SecureWorks discusses the realities of social engineering and what your organization must do to counter it. Learn more

Comcast to start encrypting email traffic with Gmail in the coming weeks
The company is currently testing the technology and plans for wider deployment Read More
 

GnuTLS library flaw could expose SSL clients, systems
  A serious vulnerability that could be exploited to crash TLS clients and potentially execute malicious code on underlying systems was patched in the popular GnuTLS cryptographic library. Read More
 


WHITE PAPER: Damballa

Big Data Helps Defend Against Breaches
The prolific number of advanced threats makes it impossible for security teams to keep up. Automating detection and response is necessary to stay ahead of attackers. Big data analytics is a future-proof foundation for outlasting the cyber security malware arms race Read More

Meet the future of computing: 10 killer hardware advancements from Computex 2014
From new chips to super-fast storage and amazing connectivity improvements, the future of computing was unveiled at Computex. Read More
 

10 hot cloud computing skills
As more companies embrace shared services, staffers with cloud computing chops are watching their fortunes rise. Read More
 


WHITE PAPER: RES Software
 
Beyond the Enterprise App Store
Leverage proactive, secure and automated IT Service delivery to move beyond the traditional App Store and empower your users. Read the white paper to learn how Learn more

Enterprise security monitoring weaknesses telegraph lots of future cybersecurity opportunities
Read More
 

Gazzang buy gives end-to-end encryption for Cloudera Hadoop
The acquisition means that industries with strong security regulations will be able to use Cloudera's Hadoop distribution Read More
 

 

SLIDESHOWS

15 more weird things in the Internet of Things

The Internet of Things is growing, and the things are getting weirder by the day.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. TrueCrypt's abrupt demise 'puzzling, bizarre'

2. Apple's coolest announcements at WWDC 2014

3. Apple's rumored iWatch to feature a round face

4. SDN seen slowing spending on routers, switches

5. 10 Google Glass Etiquette Dos and Don'ts

6. iOS 8: Way more open to your world

7. Sprint union with T-Mobile reportedly a done deal

8. Lockheed lands $915 million to begin space fence

9. A first: Microsoft pulls in more from enterprise collaboration than Cisco

10. Microsoft's translation app for Skype is seriously impressive


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: