Friday, May 24, 2013

Why don't risk management programs work?

Smartphones take center stage in two-factor authentication schemes | Pressure mounts for building in security during application development

Network World Compliance

Forward this to a Friend >>>


Why don't risk management programs work?
When the moderator of a panel discussion at the recent RSA conference asked the audience how many thought their risk management programs were successful, only a handful raised their hands. So Network World Editor in Chief John Dix asked two of the experts on that panel to hash out in an email exchange why these programs don't tend to work. Read More


WHITE PAPER: Salesforce.com

Engaging Customers in the Social Era
Many top companies now know that social media is a powerful way to listen to their customers. The most successful service teams today are not only monitoring social, they're actively participating in the conversation. Learn how to proactively engage with your customers through social channels. Learn More Now!

WHITE PAPER: Tripwire

10 Steps to Risk-based Security Management
Many professionals in information security espouse the belief—and commitment to—"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Learn More

INSIDER
Smartphones take center stage in two-factor authentication schemes
We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be easier to install. Read More

Pressure mounts for building in security during application development
Microsoft survey of IT pros and developers worldwide found only 37% worked for organizations that built products with security in mind Read More

Opinion varies on action against Chinese cyberattacks
New cyberespionage attack by People's Liberation Army prompts calls for action such as sanctions, but experts are mixed on best response Read More


WHITE PAPER: F5 Networks

The New Application Delivery Firewall Paradigm
Learn how you can effectively combat these modern attacks with a new firewall paradigm that protects the datacenters and ensures reliability. Learn More!

Aurora hackers said to have accessed law enforcement targets
Chinese cyber marauders sought more than just information on activists -- they wanted access to FBI, DOJ investigations on spies in the U.S. Read More

Florida's identity-theft rate dwarfs others
Sure, the headline gives away the answer, but if you had been asked to guess which state has the highest rate of reported identity theft you'd likely have chosen Florida: A large population of vulnerable retirees and a generally high crime rate all but guarantee the distinction. Read More

Twitter aims to become safer with two-step sign-in
Twitter, in a much-needed move to keep its users safer from cyberattacks, is introducing a more secure login process. Read More


WHITE PAPER: F5 Networks

Considerations for Combating Modern Threats
Download this White paper to learn how a new datacenter architecture based on F5's Application Delivery Firewall combats modern attacks while reducing capex. Learn More

Blue Coat Systems to acquire security analytics firm Solera Networks
Blue Coat Systems, a provider of Web traffic filtering and business assurance products and services, plans to buy security analytics specialist Solera Networks, which uses data mining techniques to classify network traffic and detect potential security threats. Read More

Growing mobile malware threat swirls (mostly) around Android
Mobile devices are getting hit by a boom in malware similar to the one that hit PCs starting with the rise of the Web, a security software executive said Tuesday. Read More

Bit9, FireEye, Palo Alto Networks team to hit zero-day malware
Bit9 has teamed with FireEye and Palo Alto Networks, which each have sandboxing technologies, in order to share information related to zero-day attack code. Read More



SLIDESHOWS

20 milestones in Ethernet's first 40 years

Reviewing the highlights of Ethernet's first four decades.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Study ranks US least riskiest place to open data center

2. Would you pay $30 for a waterproof Android smartphone?

3. Why Google taught developers how to hack Glass

10. CIOs need to rethink their roles, MIT symposium panelists say

8. Ethernet filters out porn, plus 9 other facts we learned from Bob Metcalfe

9. iPhone 6 rumor rollup for the week ending May 10

7. Dubai hotel gives guests 24-carat gold iPads

6. The 20 best iPhone/iPad games of 2013 so far

5. Nvidia, Citrix crank up virtual desktop delivery

4. Twitter's 10 most antisocial celebrities


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment