Friday, November 08, 2013

11 sure signs you've been hacked

Five ways IT can prepare for wearable devices at work | Biggest Tech Industry Layoffs of 2013

Network World Compliance

Forward this to a Friend >>>


11 sure signs you've been hacked
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable. Read More


WHITE PAPER: Riverbed Technology

End-to-End Service Management for Unified Communications
As part of Riverbed Performance Management solutions, Riverbed OPNET Unified Communications Xpert allows continuous monitoring of voice and video quality so you can catch and fix problems before they become an issue. View More

WEBCAST: Silver Peak Systems, Inc.

Combat Disasters And Optimize Business Operations
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication strategies and technologies. View now >>

INSIDER
Five ways IT can prepare for wearable devices at work
Just when IT execs are getting a handle on how to accommodate employees' personal smartphones and tablets in the workplace, the technology industry has thrown up a new challenge -- wearable computers. Read More

Biggest Tech Industry Layoffs of 2013
HP, IBM, Cisco and Juniper among those slimming down this year Read More

IDC tabs 'Specialized Threat Analysis and Protection' as new security segment
Products that can detect stealthy malware-based attacks aimed at cyber-espionage and data exfiltration should be considered a specialized area of the security market, according to research firm IDC, which has designated a new market category for them: "Specialized Threat Analysis and Protection." Read More

NSA spying prompts open TrueCrypt encryption software audit to go viral
A unique effort to crowdsource a security audit of the popular TrueCrypt open source encryption software appears to be going viral three weeks after it was launched by two U.S. based researchers in response to concerns that the National Security Agency may have tampered with it. Read More


WHITE PAPER: Netscout Systems Inc.

Holistic Service Management is Critical to the Growth of IT
This paper looks at new approaches to service delivery management to allow IT organizations to deliver better service quality, performance and user experience, and to be more predictive with application performance management and network performance management. Learn More.

Bruce Schneier wants to make surveillance costly again
The ongoing revelations of governmental electronic spying point to a problem larger than National Security Agency malfeasance, or even of security weaknesses. Rather the controversy arising from Edward Snowden's leaked documents suggest we face unresolved issues around data ownership, argued security expert Bruce Schneier. Read More

Location-tracking turns your smartphone into your stalker
It knows when you are sleeping. It knows when you're awake. Read More

Microsoft offers quick fix for Zero-Day vulnerability
Confirming reports of limited attacks in South Asia and the Middle East, Microsoft released a security advisory on Tuesday warning of a new vulnerability targeting the TIFF image format. Read More

Microsoft waves more security pros into the pool for $100K bounties
Microsoft on Monday expanded its $100,000 bounty program, and will accept reports of in-the-wild attacks that demonstrate new techniques of bypassing Windows' anti-exploit technologies. Read More


WHITE PAPER: VCE

Convergence with Vblock™ Systems: A Value Measurement
IDC found that Vblock™ System implementations sped deployments, simplified operations, improved business-support agility, saved money, and freed staff to launch new applications, extend services, and improve user/customer satisfaction. Learn More

NIST to review standards after cryptographers cry foul over NSA meddling
The federal institute that sets national standards for how government, private citizens and business guard the privacy of their files and communications is reviewing all of its previous recommendations. Read More

Long live perimeter security
It is not possible to build the perfect security perimeter. But that doesn't mean you shouldn't try. Read More

Iris ID systems go mainstream
Dropping prices, fast processing speeds and more user-friendly designs have given a boost to this highly accurate biometric technology. Read More

Security Manager's Journal: Found: 30 unmanaged servers that shouldn't be
We just found 30 servers that can't be accounted for. Thirty Internet-facing servers with no malware protection and patchy patch histories. I need to take a deep breath and figure out just how bad this is and what we can do to stop this sort of thing from happening again. Read More

Biggest risks in IPv6 security today
Although IPv6 packets have started to flow, network engineers still tread lightly because of lingering security concerns. Here are the top six security risks in IPv6 network security today as voted by gogoNET members, a community of 95,000 network professionals. Read More

First look: The Cisco/Insieme family
Cisco's Nexus 9000 product line, developed by spin-in Insieme Networks, is the company's response to the SDN craze Read More


SLIDESHOWS

19 Apple rumors that were just wrong

Some of the rumors about Apple over the years were just ridiculous.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. High-gain patch antennas boost Wi-Fi capacity for Georgia Tech

2. Cisco takes fight to SDNs with bold Insieme launch

3. Biggest tech industry layoffs of 2013

4. Intel's open-source Galileo computer on sale for $69.90

5. Chinese professor builds Li-Fi system with retail parts

6. 12 must-have iPad apps for newbies

7. Wi-Fi's latest speed boost: 802.11ac client radios

8. First look: The Cisco/Insieme family

9. FBI adds five lawbreakers to Cyber Most Wanted list

10. Spike in traffic with TCP source port zero has some researchers worried


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: