Friday, January 18, 2013

Security lessons to learn from the Manti Te'o Story

  77 MORE great ideas for running a security program | 25 crazy and scary things the TSA has found on travelers
 
  Network World Compliance

Forward this to a Friend >>>


Security lessons to learn from the Manti Te'o Story
Like many of you I was shocked yesterday when I heard about the Manti Te'o girlfriend hoax story. Having seen the interviews before the big BCS championship game and heard his heart wrenching story from his own mouth on TV, I could not accept that this whole story about his girlfriend who died of cancer, was a hoax as true. Read More


WHITE PAPER: HP, Microsoft & Intel

Big Data Requires a Remodeling of the Data Warehouse
Take a few moments to learn about a data warehouse appliance that is a massively parallel server optimized to run Microsoft's SQL Server that delivers enterprise scalability, ease of maintenance, and a single version of the truth, all for a low cost. Read Now!

In this Issue


WHITE PAPER: Pkware, Inc.

Controlling the Risks and Costs Surrounding Dormant VMs
Explore the security and compliance vulnerabilities presented by dormant virtual machines. This whitepaper defines the risks of dormant VMs, and explores best practices for compliance and the secure management of a virtual environment. Learn More.

INSIDER
77 MORE great ideas for running a security program
Last year's collection of great ideas was so well received that we decided to do an encore. We've scoured our archives for ideas from CSOs, academics, consultants and philosophers, for concepts big and small. What these ideas have in common is the ability to elevate your department and your career. So grab your highlighter, start each day by reading until you hit an idea that challenges you, mark it, and try it. Rinse and repeat. 1 Cut everybody's speaking time to 5 minutes in this months meetings Experiment: Before your next status meeting, rule that each speaker has only five minutes to speak. Enforce this limit without exception, ideally by putting a kitchen timer on the conference table. See if you get the same amount of information, and whether it clarifies and prioritizes everyone's thinking as they prepare for the meeting. If the rule works, keep it. CLICK HERE TO DOWNLOAD THE PDF Read More

25 crazy and scary things the TSA has found on travelers
From snakes, chain saws, stun guns, grenades and cannonballs, the Transportation Security Administration has not seen it all yet Read More

Cisco confirms Linksys firmware flaw, says only one router
The company said on Thursday that the serious vulnerability was solely in the Linksys WRT54GL router Read More

'Rogue clouds' giving IT staffs nightmares
Cloud computing is increasingly being adopted by companies around the world, but IT managers say "rogue cloud implementations" in which business managers sign up for services without getting IT approval is among their biggest challenges. Read More


WHITE PAPER: Shoretel

Sophisticated Simplicity
The key is to build simplicity and ease of use into these solutions from Day 1. This white paper will demonstrate a clear path to UC simplicity, and to overall success of UC deployments. Learn more.

RSA: How to steal encryption keys off hardware chips and smart cards
Cryptography Research, known for its crypto system-breaking stunts, will be at it again at the RSA Conference in San Francisco next month when it shows a way to steal encryption keys off hardware chips and smart cards. Read More

Kaspersky Lab's "Red October" cyber-espionage saga leaves lots of questions unanswered
Moscow-based anti-malware firm Kaspersky Lab says it's uncovered a years-long cyber-espionage campaign using phishing to target individuals in business, research and government offices mainly in Russia and Eastern Europe to steal sensitive data. This cyber-spy operation is also suspected to be run by Russian speakers. More about all of this is expected in the next day or so from Kaspersky Lab, which has lent an aura of drama to it all by calling the malware and its use "Red October." Read More

RSA betting its future on big data
RSA, the security division of EMC, is looking to big data for the future of security, arguing that applying analytics to massive amounts of data related to users, their devices and network management will be increasingly important to detect fraud and cyberattacks. Read More

BlackBerry gets vote of confidence from monitoring-software maker
There's good news for a change for BlackBerry maker Research in Motion, as monitoring-software vendor SpectorSoft today announced its first software support for BlackBerry in the enterprise. Read More


WEBCAST: CDW Corporation

Unified Threat Management: A Better Approach to Security
In this Webcast you will learn how Unified Threat Management (UTM) combines firewall, IPS, Web filtering, antivirus and more in a single box to combat a broad range of threats efficiently and economically. Learn More.

Researchers easily crack Philips hospital IT system
A Philips information management system used in making hospital administrative chores more efficient contains vulnerabilities that can be exploited to gain full control of the product, a security vendor says. Read More

Security vendors failing to tackle mobile malware, say CISOs
Malware is still the biggest threat to mobile security, but most mobile device management (MDM) strategies tend to focus on securing the physical device in case of loss of theft, according to Peter Gibbons, head of Information Security at Network Rail. Read More

Major flaw in Java-based Spring Framework allows remote-code execution by attackers
There's a major flaw in the Java-based Spring Framework open-source development code that allows remote-code execution by attackers against applications built with it, according to the security firm which identified the flaw. Read More

Forrester survey tries to pinpoint hardest-working CISOs across the world
Do chief information security officers (CISOs) in North America work harder than their security counterparts in Europe? Read More

Truth in IT job postings: What those want ads really mean
Make no mistake about it: There's a massive difference between what employers say and what they actually mean Read More

 
 
 

SLIDESHOWS

9 essential Internet Explorer 10 add-ons
Quality add-ons for Internet Explorer are few and far between.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Kaspersky Lab's 'Red October' cyber-espionage saga leaves lots of questions unanswered
  2. 'Rogue clouds' giving IT staffs nightmares
  3. The dumbest products of CES 2013
  4. Cisco working on an IT simplification platform
  5. Verizon client worker outsourced part of his job to China so he could have more free time
  6. Oracle releases emergency Java patch; experts warn flaws may take 2 years to fix
  7. Bankers comparing bonuses? There's an app for that
  8. Cisco investigates reported Linksys router flaw
  9. Unlucky Las Vegas man besieged by lost-phone seekers
  10. Microsoft takes urgent step to patch stubborn Internet Explorer flaw
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment