Friday, August 23, 2013

Poison Ivy RAT gnawing on systems again

Products of the week 8.19.13 | 5 security best practices for SMBs

Network World Compliance

Forward this to a Friend >>>


Poison Ivy RAT gnawing on systems again
Old Remote Access Trojan experiencing new resurgence among hackers Read More


WHITE PAPER: Xirrus

Optimize Your Wi-Fi Network
Driven by the rapid evolution of mobile devices, the move to cloud-based applications and data, and the continued development of new wireless technologies, Wi-Fi has become the network of choice for connectivity. Most new devices no longer have wired connectivity. IT managers now count Wi-Fi as an essential business facility. Learn more.

WHITE PAPER: Juniper Networks

A Proven Solution for Today's BYOD Demands
Wireless access is mission-critical for most organizations. BYOD has accelerated the need or wireless capacity, and WLANs must deliver a robust wired-like experience in today's dense environments. High-scale, third-party testing has validated Juniper's ability to support the densest BYOD environments while delivering reliable wireless access. Learn more.

Products of the week 8.19.13
Our roundup of intriguing new products from companies such as CA and HP. Read More

INSIDER
5 security best practices for SMBs
If your small-to-midsized business is like most, you're playing a game of chicken with cyber-criminals. You probably know that your defenses probably aren't able to repel today's sophisticated, persistent attacks, yet you hope that you'll be overlooked. Read More

DHS cybersecurity appointment seen as government-industry bridge
Appointing McAfee's Phyllis Schneck welcomed given new tension between government, private sector following NSA revelations Read More

Rapid 7 to offer new tools for risk management, performance tracking
Rapid 7 goes outside its usual area and talks tools to help organizations deal with user-based risk and track security control performance Read More


WHITE PAPER: Condusiv Technologies

Lab report: V-locity VM Accelerates Exchange 60% on VMs
For this briefing, openBench Labs tested the ability of V-locity VM to optimize I/O in a dedicated email service domain centered around a VM running Exchange 2010. Read Now!

Study finds big gap about app security between execs and IT staffers
Corporate leaders' optimism is unwarranted, say security pros on the frontline Read More

Quiz: Name that hacker
After breaking into networks for fun, profit, and to fulfill political agendas, some did prison time. Read More

Cloud market destined to change following NSA leaks
Forrester, which says $180B will be lost to U.S. firms over Snowden leak, sees an opportunity for countries open about their surveillance Read More

Android now 'mobile world's equivalent' of Windows for hackers
The difference between Windows and Android malware is that the latter is evolving much quicker, says Kaspersky Lab researcher Read More


WHITE PAPER: Mitel Networks

Network World Report: Getting Ahead of BYOD
Organizations are being flooded with employee-owned gadgets and valiantly trying to accommodate requests to provide access to corporate resources while maintaining control enough to minimize risk and meet compliance requirements. Learn More

U.S. Dept. of Energy reports second security breach
For the second time this year, the U.S. Department of Energy is recovering from a data breach involving the personally identifying information of federal employees Read More

Rise in data breaches drives interest in cyber insurance
Companies became much more interested in insurance policies after an incident affected them, study found Read More

Baby monitor hack highlights manufacturers' security shortfalls
In addition to lax passwords, manufacturer lacks a effective way to get its patches and updates out to customers. Read More

Syrian Electronic Army targets Washington Post, CNN, and Time
The Syrian Electronic Army, just days after targeting the New York Post, has compromised Outbrain.com, a content recommendation platform, and used their access to target readers of the Washington Post, CNN, and Time with pro-Assad propaganda Read More

17 epic Microsoft Windows Auto Update meltdowns
These legendary clunkers made Patch Tuesday a living hell for Windows users the world over Read More


SLIDESHOWS

Celebrating Unix heroes

This presentation features the early Unix pioneers and their contributions to the computer industry.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Here's what can happen at Rackspace when it's your birthday

2. CCIE turns 20: How Cisco transformed itself and the IT world

3. The last days of Unix

4. 5 steps Microsoft can take to beef up Windows Phone 8 market share

5. Can the U.S. Postal Service find a future running a gov't cloud-based authentication service?

6. iPad 5 rumor rollup for the week ending Aug. 20

7. 7 IT security skills certifications on the rise

8. Next up for WiFi

9. Attackers use Ramnit malware to target Steam users

10. 5 big things to watch for at VMworld


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment