Friday, March 09, 2012

Can big data nab network invaders?

Patch Tuesday: Microsoft to release 6 patches, 1 critical | Forbes's Top Tech Billionaires

Network World Compliance

Forward this to a Friend >>>


Can big data nab network invaders?
The buzz in security circles about "big data" goes something like this: If the enterprise could only unite its security-related event data with a warehouse of business information, it could analyze this Big Data to catch intruders trying to steal sensitive information. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant on-demand remote support with LogMeIn Rescue
Without pre-installed software, quickly connect to PCs, Macs, smartphones and tablets anywhere in the world. Get in, solve the problem, and be done in a flash. Plus, Rescue's SaaS-based platform means free upgrades and zero maintenance. Try it free today.

RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
Companies like Foursquare, StrongMail, and ExoIS are taking charge of cloud server security using Halo from CloudPassage, which ensures easy, scalable, and automated security for dynamic cloud environments. Register today to Secure 25 Cloud Servers for Free with Halo Basic.

Patch Tuesday: Microsoft to release 6 patches, 1 critical
Microsoft announced today that next week's Patch Tuesday will be the lightest of 2012, with six security bulletins and just one rated critical. Read More

Forbes's Top Tech Billionaires
In Forbes Magazine's annual list of billionaires, which is out this week, tech heavyweights made a strong showing - 10 of the 50 richest people in the world come from what the publication defines as the technology sector. Read More

Chinese Firewall's most blocked terms
Terms related to political activists, anti-government movements and state censorship efforts are the most likely to be censored on Chinese blogs and social media sites, according to researchers at Carnegie Mellon University. Read More

Hackers claiming to be from Anonymous take out Vatican site
The main website of the Vatican was inaccessible Wednesday after what appears to have been an attack by malicious hackers claiming to be affiliated with the Anonymous hacking collective. Read More


WHITE PAPER: NetIQ

Streamlining IT Operations with Business Service Management
This IDC Technology Spotlight examines the benefits of a business service management practice and tools in response to IT environments becoming more dynamic and complex due to the increased use of virtualization, cloud, SOA, and n-tier application architectures. Learn More

Wikipedia parent finally ditching Godaddy over SOPA support
The Wikimedia Foundation, making good on a Dec. 23 promise by Jimmy Wales during the height of the anti-SOPA firestorm, has publicly announced it is transferring all of its domain names from GoDaddy to MarkMonitor as punishment for GoDaddy's early support of the failed anti-piracy legislation. Read More

Is it really Zeus vs. Anonymous?
Were Anonymous supporters really duped into installing the Zeus botnet that steals their confidential information, including email login information, banking user names and passwords? Symantec says yes. Read More

Contests hack the heck out of Chrome
Dueling browser-exploit contests at the CanSecWest conference yielded immediate results -- two hacks against Google Chrome -- with contestants in both competitions demonstrating exploits within an hour of the contests' opening. Read More

AT&T reluctant to support FCC call to adopt new PC security measures
The head of the Federal Communications Commission (FCC) wants the ISP broadband providers to help battle botnets by being more active in helping their subscribers eradicate malware infections on their PCs. But AT&T's chief security officer said AT&T is reluctant to go beyond its current anti-malware efforts. Read More


WHITE PAPER: Shoretel

Reduce Cellular Spend With ShoreTel Mobility
Organizations continue to spend valuable budget on international and long distance calls. This white paper shows how a multi-location organization can reduce cellular spend by leveraging current Wi-Fi and dual-mode smartphone deployments, and offloading expensive minutes from cellular networks to virtually free WLAN networks. Read now!

Torvalds to bad security devs: "Kill yourself now"
Linux creator Linus Torvalds last week posted a searing rant to Google+ hammering the developers of OpenSUSE for "mentally diseased" security measures. Read More

A $500,000 bet on Internet security
Longtime cloud security advocate Philippe Courtot believes he has identified the Achilles' heel of cloud security, and he wants to protect it. Read More

DNSChanger victims get extension until 8 July
Companies and individuals infected with the DNSChanger malware have been given a further 120 days to clean their PCs before they are disconnected from the Internet, it has been announced. Read More

Which Android Security Tools Are Worth Your Time?
As Android smartphones and tablets grow in popularity, it's no surprise that the number of malware outbreaks is growing. Mobile antimalware apps can give your phone or tablet an extra layer of protection--but which ones do the job? Independent security testing lab AV-Test evaluated 41 virus scanners for Android, including those by mainstream security companies like Norton and Trend Micro. AV-Test used the Android emulator built into the Android SDK and ran each of the apps through a series of malware detection tests. To ensure that everything lined up, all the results from the emulator were tested on a real device. Read More

Trustwave to acquire M86 Technologies
Trustwave today announced it has entered into a deal to acquire M86 Security for an undisclosed price. Both firms are privately held, and the deal is expected to be concluded in a matter of weeks. Read More



SLIDESHOWS

Inside Apple's iPad world-wide ubiquity
As the new iPad emerges, we look at the iPad as a cultural phenomenon.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Why the holouts aren't buying an iPad 3
  2. 30,000 WordPress blogs infected to distribute rogue antivirus software
  3. 4 things we want to see in iPad 4
  4. 10 most powerful PaaS companies
  5. Social media monitoring required to attend college or to be hired?
  6. Apple unveils its next iPad
  7. Chinese Firewall's most blocked terms
  8. Enterprise IT likes what it sees in new iPad
  9. 'Big data' creating big career opportunities for IT pros
  10. CIOs struggle to find IT talent

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment