Search This Blog

Tuesday, August 19, 2014

Industry Standards for Secure Network Access

  Start-up fights ambush attacks on SDN, virtual machine networks | Hackers steal data on 4.5 million US hospital patients

 
  Network World Security

Forward this to a Friend >>>


Industry Standards for Secure Network Access
As someone who is passionate not only about innovation in security but also about the standardization of those innovations, I thought I'd point out a few of the recent efforts that I've either been involved in, or am just very interested in. Read More
 




WHITE PAPER: Dropbox

The Truth About Cloud Security
"Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception? Keeping data close to home, on premises, makes business and IT leaders feel inherently more secure. But the truth is, cloud solutions can offer companies real, tangible security advantages. Learn more!

Start-up fights ambush attacks on SDN, virtual machine networks
GuardiCore developing "honeypot" approach to detecting and blocking stealthy attacks. Read More
 

Hackers steal data on 4.5 million US hospital patients
A major U.S. hospital operator says hackers based in China broke into its computer systems and stole data on 4.5 million patients.Community Health Systems said the attack occurred in April and June of this year, but it wasn't until July that it determined the theft had taken place.Working with a computer security company, it determined the attack was carried out by a group based in China that used "highly sophisticated malware" to attack its systems. It didn't release specific details of the attack."The attacker was able to bypass the company's security measures and successfully copy and transfer certain data outside the company," it said in a filing with the U.S. Securities and Exchange Commission.To read this article in full or to leave a comment, please click here Read More
 


WHITE PAPER: Dell Software
 
Anatomy Of A CyberAttack
Do you know how to keep cyber-criminals out of your network? Cyber-criminals employ complex techniques to avoid detection as they sneak into corporate networks to steal intellectual property. Don't give the bad guys the keys to your network. Learn how to protect your organization from emerging threats in our e-book. Read Now

Heartbleed exposes weaknesses in hardware design
Heartbleed highlights memory and cache architecture weaknesses, but a DHS-funded project proposes changes Read More
 

The world's coolest and geekiest mailboxes
Read More
 


WEBCAST: Venafi

Responding to New SSL Cybersecurity Threat
The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. Learn More

Tennessee firm blames bank for $193K cybertheft
TEC Industrial sues TriSummit bank for failing to spot fraudulent wire transfers. Read More
 

Hexadite's Automated Incident Response Solution narrows the gap between detection and response
It's not uncommon for CIRT personnel to ignore various automated security alerts, largely because they don't have enough time to investigate every alert. As attacks become more frequent and threats grow more serious, the only way organizations will be able to stay on top of security is to deploy automated responses. Read More
 

 

SLIDESHOWS

Top techs the CIA thinks are hot

Through its investment firm called In-Q-Tel, the CIA funds companies, mostly start-ups, to push forward technologies deemed useful to government intelligence agencies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Google wraps its trans-Pacific fiber cables in Kevlar to prevent against shark attacks

2. Gartner: Think twice before deploying Windows 7

3. New Microsoft same as the old Microsoft

4. Why TCP/IP is on the way out

5. Attacks exploited YouTube & Microsoft Live to install surveillance

6. The world's coolest and geekiest mailboxes

7. The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

8. iPhone 6 rumor rollup for the week ending Aug. 15

9. 10 things about (the Internet of) things

10. Top 20 colleges for computer science majors, based on earning potential

JOIN THE IDG CONTRIBUTOR NETWORK

The IDG Contributor Network is a collection of blogs written by YOU -- leading IT practitioners -- about the technology, business opportunities and challenges you face everyday. We invite you to become a contributor or participate by joining the conversations your peers spark.

Apply now to become a member


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments: