Friday, August 29, 2014

Security council blames breaches on poor PCI standard support

  11 Internet of Things ideas worth watching | Three security practices that IoT will disrupt

 
  Network World Security  

Security council blames breaches on poor PCI standard support
"Best practices" guidance from PCI security group says compliance needs to be 365-day-a-year focus. Read More
 


WHITE PAPER: Dell Software
 
Anatomy Of A CyberAttack
Do you know how to keep cyber-criminals out of your network? Cyber-criminals employ complex techniques to avoid detection as they sneak into corporate networks to steal intellectual property. Don't give the bad guys the keys to your network. Learn how to protect your organization from emerging threats in our e-book. Read Now

WHITE PAPER: Skyhigh Networks
 
Cloud Adoption & Risk Report Reveals Top 20 Cloud Services
Based on anonymized data from over 10 million users across over 200 companies, the Skyhigh Cloud Adoption and Risk Report has become the de-facto data source on cloud adoption and risk View Now>>

11 Internet of Things ideas worth watching
Cisco solicits IoT ideas in Innovation Grand Challenge Read More
 

Three security practices that IoT will disrupt
As the Internet of Things comes into being, vendors are feverishly making internet-connected devices ranging from refrigerators to light bulbs, but often they do so on a shoestring budget that doesn't include sophisticated analysis of how secure they are from network attacks. Read More
 

Vulnerabilities on the decline, but risk assessment is often flawed, study says says
The good news is that IBM X-Force predicts the number of publicly reported vulnerabilities will drop under 8,000 this year for the first time since 2011. The bad news is that fewer vendors are publicly reporting vulnerabilities. Read More
 


WHITE PAPER: Spanning

Warning: Cloud Data at Risk
Experts agree that relying on SaaS vendors to backup and restore your data is dangerous. Yet that's exactly what huge portions of the business world are doing, according to the results of an exclusive new survey from IDG Research. Learn More

Toss routers with hardcoded passwords, expert says
Security experts recommend that business replace a flawed router that Trend Micro reports has a backdoor that hackers could use to monitor Internet traffic. Read More
 

New malvertising campaign hit visitors of several high-profile sites
Recent malicious advertisements have been placed on popular Web sites, redirecting visitors to sites that download software that turn enlist victim machines into botnets. Read More
 

Why physical security (and InfoSec!) still matter
With ever increasing numbers of electronic break-ins compromising more and more data it's tempting to overlook network physical security, but it's important to remember that protecting the actual hardware infrastructure is just as important. Read More
 


WHITE PAPER: OpenMarket

How CIOs Can Guide the Enterprise to Mobile Success
In this paper we look at the new, front-line role of IT and security, specifically within enterprises using mobile messaging technologies, and suggest ways to mitigate risk and avoid costly mistakes and pitfalls. View Now>>

Netflix open sources internal threat monitoring tools
Netflix is making public some tools it uses to track whether attackers are considering attacking its services by monitoring public Web discussions and analyzing the results. Read More
 

Retailers urged to defend against 'Backoff' point-of-sale malware
The PCI Security Standards Council says the Backoff malware is 'a very real threat' Read More
 

Hot products at VMworld 2014
Click through all the products being released at VMworld this week Read More
 

 

SLIDESHOWS

12 oddball odes to open-source

Hey, I just met you / and this is crazy / but here's my pub key / so msg me maybe.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Toss routers with hardcoded passwords, expert says

2. One frustrating Linux problem that Windows, Mac users don't deal with

3. Netflix open sources internal threat monitoring tools

4. Internet of Overwhelming Things

5. US warns 'significant number' of major businesses hit by Backoff malware

6. 15 simple, secret Windows tips and tricks designed to save you time

7. Juniper CEO on IoT, co-creation and the IOP

8. The 10 best laptops of 2014 (so far)

9. 11 Internet of Things ideas worth watching

10. How Google Fiber is disrupting the broadband deployment model


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment