Friday, November 01, 2013

Fake social media ID duped security-aware IT guys

First look (and listen): Firefox 25 | CIO at Waste Management Wears Many Hats

Network World Compliance

Forward this to a Friend >>>


Fake social media ID duped security-aware IT guys
Security experts used fake Facebook and LinkedIn profiles pretending to represent a smart, attractive young woman to penetrate the defenses of a U.S. government agency with a high level of cybersecurity awareness, as part of an exercise that shows how effective social engineering attacks can be, even against technically sophisticated organizations. Read More


WHITE PAPER: CDW

8 Steps to an effective Mobile Device Policy
It's no secret that mobile devices and applications are flooding into organizations of all types and sizes. Technology research firm Gartner predicts that by 2016, 40 percent of the global workforce will be mobile, with 67 percent of workers using smartphones. Read Now

In this Issue


WHITE PAPER: Novell

Mobile Zen: Balancing End-User Productivity and IT Control
Mobility is often seen as a zero-sum game: either end users or IT can win, but never both. Learn how users can have the convenience and mobile productivity they need, while IT retains control over enterprise goods. Victory for both sides. Learn More

First look (and listen): Firefox 25
Firefox's new support for HTML5's web audio feature steals the show Read More

INSIDER
CIO at Waste Management Wears Many Hats
Puneet Bhasin is CIO and senior vice president of technology, logistics, customer service and strategic accounts -- a portfolio that keeps him focused on business matters. Read More

Apple iOS apps subject to man-in-the-middle attacks
Many Apple iOS applications are vulnerable to a man-in-the-middle attack that can result in permanent manipulation by the attacker, according to start-up Skycure, which released its research findings on this today during the RSA Europe conference. Read More

Start-up Threat Stack aims to protect Linux-based clouds from hackers
Start-up Threat Stack says it's making its hacker-detection for the cloud software available for controlled beta testing this week, with general availability expected before the end of the year. Read More

Sophos takes first step in rolling out cloud security strategy
Sophos today leapt forward with a cloud strategy under which it will deliver integrated management and policy enforcement for its endpoint security software and unified threat management (UTM) firewall through a cloud-based console for both its enterprise customers and industry partners. Read More


WEBCAST: Silver Peak Systems, Inc.

Combat Disasters And Optimize Business Operations
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication strategies and technologies. View now >>

Start-up unveils alert system for malware
Start-up Cylance unveils its first product today, software called CylanceV that determines what is a malware threat against Windows-based machines by using an analysis technique it refers to as "machine learning algorithms." Read More

Cisco to release free standard software to boost Web videoconferencing
Web videoconferencing may get easier after a decision by Cisco Systems that should help bring widely used technology into browsers. Read More

Windows XP infection rate may jump 66% after patches end in April
Microsoft yesterday again but the scare into Windows XP users, telling them that after April 8, 2014, the chance that malware will infect their PCs could jump by two-thirds. Read More

Many iOS apps found open to hijacking on public Wi-Fi
An Israeli startup has discovered a vulnerability in many iOS apps that attackers could secretly exploit over a public Wi-Fi network to send their own data to an Apple iPhone or iPad. Read More

Web app security best practices and the people who love them
When a website is attacked, the results can be devastating to an organization -- both financially and from a brand perspective. Given modern society's ever-increasing reliance on the Web, the impact of a breach and the associated costs are going up, and fast. Adding more "robust" firewalls or allocating more budget to anti-virus protection is not the answer. It's still an important step, sure, but these controls provide nearly zero protection against today's web-based attacks. Read More


WHITE PAPER: CDW

Software Asset Management: Practices for Success
This white paper discusses best practices that can dramatically increase your success rate of a SAM deployment. Make sure and follow these steps and verify that your SAM toolkit has the necessary functionality to keep your organization steps ahead of the competition -it's a long term investment. Read Now

Gartner: 'Five Styles of Advanced Threat Defense' can protect enterprise from targeted attacks
Attackers want to compromise networks and computers to steal sensitive information from the enterprise by using sophisticated malware. Research firm Gartner says IT can protect the enterprise against targeted attacks in five basic ways, and recommends combining at least two of them together for best effect. Read More

When it comes to troubleshooting and threat detection, NetFlow AND packet capture trump all
NetFlow is great for providing application usage information and can fulfill most organizations' needs for understanding application and service activity, but packet capture solves the most granular end-user problems and is essential when it comes to compliance and transactional analysis. Read More

The emerging turf battle between information and physical security pros
A former vice president of security at a mid-size southwestern U.S. company vows to take a much harder look at his next employer's security culture after spending almost two years embattled with the IT manager over turf and his disregard for physical security matters. Read More

Seven essentials for VM management and security
Virtualization isn't a new trend, these days it's an essential element of infrastructure design and management. However, while common for the most part, organizations are still learning as they go when it comes to cloud-based initiatives. Read More

Masters of disasters: IT survivors of Katrina, Sandy and other natural disasters share their DR tips and tricks
Natural and manmade disasters are facts of life. Smart IT managers prepare for the worst before trouble hits, so that the businesses and government institutions that rely on IT can resume normal operations as soon as possible. Read More

5 Best and 5 Worst Cities for IT Salaries
Want to know where IT professionals make the highest -- and the lowest -- salaries? We dig into Kforce's 2014 Salary and Employment Guide to see where today's tech workers make the most and the least, the top paying IT roles in each city, and the cost of living for each community. Read More


SLIDESHOWS

10 most powerful network management companies

Our look at the biggest players in the network management, um, world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Raspberry Pi as a Network Monitoring Node

2. Cisco to release free standard software to boost Web videconferencing

3. Prosecutor in Aaron Swartz case targeted by 'swatting'

4. Monster bosses: Be very afraid

5. Report: NSA breaks into Yahoo, Google data center links

6. Mozilla releases 10 patches, five critical, for Firefox

7. Coast Guard spills the beans on Google's mystery barges

8. Fake social media ID duped security-aware IT guys

9. Gartner: 'Five styles of advanced defense' can protect enterprise from targeted attacks

10. Microsoft cybersecurity report warns users about the evils of clinging to XP


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment