Friday, March 23, 2012

7 simple steps for thwarting hactivists

How GSA is securing its cloud apps | Ads in mobile apps aren't just annoying -- they're risky, too

Network World Compliance

Forward this to a Friend >>>


7 simple steps for thwarting hactivists
More data was stolen from corporate networks last year by hactivists than by cybercriminals, according to a new report from Verizon. Read More


RESOURCE COMPLIMENTS OF: Microsoft

Try Microsoft Office 365, free
Collaborate in the cloud with Office, Exchange, SharePoint, and Lync videoconferencing. Access, edit, and share documents. Starting at $8/user/month. Try it free.

In this Issue


WHITE PAPER: McAfee

Data Loss by the Numbers
This paper breaks down attack sources into four categories: external, malicious insiders, accidental insiders, and unknown. Breach categories are limited to areas that are most directly associated with data centers. View Now

How GSA is securing its cloud apps
As the General Services Administration (GSA) migrates to a work-anywhere, work-anytime strategy, the real estate arm of the U.S. federal government is discovering that having an iron-clad security strategy is critical to its adoption of cloud-based applications. Read More

Ads in mobile apps aren't just annoying -- they're risky, too
Many mobile apps include ads that can threaten users' privacy and network security, according to North Carolina State University researchers. Read More

Symantec to acquire Nukona to assist in BYOD strategy
Symantec today announced it has reached an agreement to acquire privately held Nukona, a maker of mobile application management software, for an undisclosed price. Read More

Biggest threat to corporate nets in 2011? Hactivists, not cybercriminals
Hactivists - not cybercriminals - were responsible for the majority of personal data stolen from corporate and government networks during 2011, according to a new report from Verizon. Read More


WHITE PAPER: Silver Peak Systems, Inc.

Silver Peak's Advantages in a Disaster Recovery Environment
Why do industry analysts agree Silver Peak is the WAN Optimization vendor of choice for offsite data replication? It starts with a unique, next generation architecture. Read more.

Why Hackers Set Their Sights on Small Businesses
If you run a small business, and think that none of your data was of interest to a hacker, consider this: what if a hacker could take stolen bank account or credit card information from your computer and package it with the same information from a hundred or a thousand other small businesses? Would it be worth something then? Read More

Most webmasters don't know how their websites got hacked, report says
Most owners of compromised websites don't know how their sites got hacked into and only 6 percent detect the malicious activity on their own, according to a report released by StopBadware and Commtouch on Thursday. Read More

eBay CISO receiving security industry lifetime achievement award
Dave Cullinane, chief information security officer at eBay, will be honored on March 28 in Boston with the SecureWorld Lifetime Achievement Award "for his outstanding contributions to the advancement of the information security community." Read More

LulzSec is back; Anonymous targets Imperva
Hacker collective LulzSec, six of whose members were arrested earlier this month, will resume active operation April 1, according to a video posted on YouTube. Read More


WHITE PAPER: Raritan

Data Center Transformations
This paper discusses ways to simplify data center transformation and introduces a new process – BOCA – Build Outs, Consolidations and Acquisitions. Learn the five stages of BOCA and see how the right remote access and IT infrastructure management tools, deployed early and continuously monitored, can dramatically improve overall efficiency. Read now!

Cyber-espionage botnet tied to country of Georgia website remains a mystery
A security firm in Slovakia is asserting that a website operated by the country of Georgia has been used as part of a botnet to conduct cyber-espionage against that country's residents. Read More

Researchers find new type of 'fileless' malware
Researchers have discovered an extremely rare and possibly unique form of "fileless" malware that executes entirely in memory without the need to save any files to the hard drive of a victim's PC. Read More

Firefox to turn on default encryption for all Google searches
Mozilla is currently testing default encrypted Google searches for all Firefox users, with the intent to make all Google searches encrypted in the near future, the browser maker said on Wednesday. Read More

Most fraud against businesses from bad checks, not electronic payments
When it comes to financial fraud against businesses, it's old-fashioned paper checks that wreak more monetary damage than fraud committed through electronic payments, such as debit/credit, corporate cards, or Automated Clearinghouse (ACH) payments. Read More

Developers say application security lacking
Are enterprise applications really secure? It depends on whom you ask. Read More

Blue Coat unifies security reporting in cloud service, appliances
Blue Coat Systems today said it's unified the real-time reporting in its cloud-based security service with that in its full line of ProxySG security appliances so that enterprises receive real-time information related to both. Read More



SLIDESHOWS

Review: Android-based Wi-Fi stumblers
Four easy-to-use wireless management and security tools that cost under $2.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Sexist gaffe costs startup event sponsors
  2. Cisco's big comeback
  3. 7 steps for thwarting hactivists
  4. Chrome's trumping of IE could herald things to come
  5. Researchers find new type of 'fileless' malware
  6. Cisco helps users welcome BYOD
  7. Five very cool (but kinda creepy) mobile technologies
  8. Yes, Microsoft wants Windows 8 to compete with iPads
  9. iFixit dismantles the new iPad
  10. LulzSec is back; Anonymous targets Imperva

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment