Friday, February 27, 2015

You’ve been hacked. Now what?

MIT researchers building chips to prevent leaky Internet of Things | Microsoft SharePoint coming up short for most enterprises, study finds

Network World Compliance

INSIDER
You've been hacked. Now what?
What should a company do after it’s been hacked? It’s a question Target, Home Depot, Sony Pictures Entertainment and others have had to ask over the past year or so. And it’s likely that other organizations will be facing the same question over the coming months.To read this article in full or to leave a comment, please click here(Insider Story) Read More


WHITE PAPER: IBM

Enhanced 360-degree View of the Customer
A true 360-degree view of the customer enables businesses to turn a swell of data into precise insights to drive engagement, revenue and loyalty. Learn More

In this Issue


: IBM

Enhance Your 360-Degree View of the Customer
How can organizations tap into the vast flow of data, weed out the information that matters, and then link that meaningful sentiment to specific customers? This ebook explores how an enhanced 360-degree view of the customer optimizes and facilitates more personalized customer interactions. Learn More

MIT researchers building chips to prevent leaky Internet of Things
MIT researchers this week are demonstrating a design for new radio chips that could be used to efficiently power the Internet of Things.The researchers, led by MIT Professor in Electrical Engineering Anantha Chandrakasan, are presenting their work at the IEEE International Solid-State Circuits Conference in San Francisco, where the show theme is "Silicon Systems -- Small Chips for Big Data." The MIT paper is titled "A +10dBm 2.4GHz Transmitter with sub-400pW Leakage and 43.7% System Efficiency."MORE: Internet of Things to bring new economic boomTo read this article in full or to leave a comment, please click here Read More

Microsoft SharePoint coming up short for most enterprises, study finds
Many SharePoint installations at enterprises have been doomed largely due to senior management failing to really get behind the Microsoft collaboration technology, according to a new study by AIIM, which bills itself as "the Global Community of IT Professionals."The AIIM (Association for Information and Image Management) Web-based survey of 409 member organizations found that nearly two-thirds described their SharePoint projects as either stalled (26%) or not meeting original expectations (37%).RELATED: 12 Key Strategies for Unlocking the Secrets of SharePoint User AdoptionTo read this article in full or to leave a comment, please click here Read More

Some Bitdefender products break HTTPS certificate revocation
This allows man-in-the-middle attackers with access to revoked, but otherwise valid, certificates to manipulate encrypted traffic Read More

NSA director wants gov't access to encrypted communications
The U.S. should be able to craft a legal framework to let government agencies read encrypted data, Rogers says Read More

INSIDER
How enterprises can use artificial intelligence
Enterprise IT shops are finding that artificial intelligence isn't just for robotics anymore.To read this article in full or to leave a comment, please click here(Insider Story) Read More


WHITE PAPER: VMTurbo, Inc.

Cloud: Delivering Performance in Shared Environments
This whitepaper explores how service providers use VMTurbo to provide consistent performance across all workloads, as well as the three roles a responsible managed service provider (MSP) takes in order to accomplish that directive. Learn More

Edward Snowden documentary Citizenfour wins Oscar
Edward Snowden shook up the US security establishment with revelations of NSA surveillance Read More

Lenovo website hacked in wake of Superfish debacle
Source code for the page names two alleged hackers Read More

Flaw in popular Web analytics plug-in exposes WordPress sites to hacking
Attackers can easily crack cryptographic keys used by the WP-Slimstat plug-in and use them to read information from a site's database Read More

INSIDER
Desktop virtualization review: VMware Workstation vs. Oracle VirtualBox
Few technologies have had a greater impact on business efficiency and IT productivity than virtualization. While most of the impact has been felt in the data center and in the cloud, virtualization has also transformed IT work on the desktop, where it retains an important role. Here I compare the two leading products in this category: VMware Workstation and Oracle VirtualBox.In executing tests on Workstation 11, I ran into almost no headaches, and in the few cases an item surprised me, I found useful information in the ample VMware documentation. Good documentation has for years been one of the hallmarks of VMware products. This continues to be true.To read this article in full or to leave a comment, please click here(Insider Story) Read More

Gemalto says spies probably didn't steal mobile phone encryption keys from it after all
After an internal investigation, Gemalto said hacks on its network didn't breach separate infrastructure protecting SIM card encryption keys Read More


WHITE PAPER: IBM

Total Economic Impact of InfoSphere Master Data Management
Forrester Consulting describes Master Data Management (MDM) as a 'critical business capability and technology foundation.' IBM clients interviewed achieved a variety of operational benefits from their MDM programs, including call center savings, improved efficiencies for inside sales staff, and lower costs for customer mailings and returns. Learn More

Google scraps annual Pwnium bug-hunting contest
Google said the change will prevent researchers from holding onto dangerous bugs in order to claim a big prize Read More

Anthem's latest breach estimate says 78.8 million were affected
At least 14 million records are incomplete, but they probably don't belong to Anthem members Read More

Network World has a Snapchat account: Now what?
Network World Mainly because Network World editors just don't have enough to do keeping up on the latest news and trends in networking, cloud computing, mobility and security, we feel compelled to pile on ourselves by establishing new social media accounts. After all, we know you want to hear from us wherever you are on the Web.So we have Facebook, Twitter, Instagram, LinkedIn, Pinterest, Tumblr and even Google+ accounts. We're more active on some than others. Twitter and Facebook generate good back and forth with readers, some of the others not so much.To read this article in full or to leave a comment, please click here Read More

Interns loving life at Facebook, Google & Apple
While many young people are reportedly abandoning Facebook as a place to socialize online, many others say it's a great entryway to the workforce. For the second year in a row, Facebook is the highest rated company by interns based on the feedback they share on jobs and career online marketplace Glassdoor.Other tech companies also rated well, with Google (#3), Yahoo! (#6), Apple (#11), Microsoft (#13), Intel (#14) and Qualcomm (#16) among those in the top 25 (companies were rated on a 5-point scale ranging from very dissatisfied to very satisfied). One tech vendor on last year's Top 25 List that didn't repeat this year: Cisco Systems. Google, meanwhile, has slipped a bit down the list in recent years, having been the top company in 2012 and 2013.To read this article in full or to leave a comment, please click here Read More

INSIDER
Emerging enterprise techs to watch
New technologies affecting enterprise IT continue to be invented, commercialized and adopted. The latest batch of techs looming on the horizon, examined in greater detail below, include quantum computing, gamification, reactive programming, augmented reality, transient computing electronics and Named Data Networking.To read this article in full or to leave a comment, please click here(Insider Story) Read More


SLIDESHOWS

Top 10 DNS attacks likely to infiltrate your network

DNS-based attacks are on the rise because many organizations don't realize DNS is a threat vector and therefore don't protect it.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Lenovo's Superfish nightmare may be the tip of the iceberg

2. 10 Reasons why the Raspberry Pi 2 Model B is a killer product

3. 10 products you could only find at RadioShack

4. New tools can detect hidden malware

5. 8 most intriguing gadgets of 2015

6. Low tech 'visual hacking' successful nine times out of 10

7. New weapons offer hope against advanced cyber-attacks

8. Avaya extends SDN offerings

9. You've been hacked. Now what?

10. HP deal marks milestone for open source networking hardware


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment