Friday, December 20, 2013

IT security chiefs can make big bucks but are they happy?

The worst security SNAFUs of 2013 | Is open source encryption the answer to NSA snooping?

Network World Compliance

Forward this to a Friend >>>


IT security chiefs can make big bucks but are they happy?
The top IT security chiefs make salaries that can run over $1 million per year, but are they happy? Ponemon Institute, which interviewed about 700 security professionals in the top IT security spot at their companies to find out, learned they make big bucks but the job often feels stressful and isolated. Read More


WHITE PAPER: HP and Intel® Xeon® processors

HP BladeSystem Leadership and Innovation for Data Centers
In Gartner's 2013 Blade Server Magic Quadrant, HP has been positioned as a leader for completeness of vision and ability to execute. Read this paper to learn why HP BladeSystem is the leading choice of IT professionals. Learn More

In this Issue


WHITE PAPER: Mobiquity Inc.

Key Elements for Creating Enterprise-Wide Strategy
Mobility in business is not a new concept, but the factors that determine a mobile strategy are constantly in flux. Learn how your company can become "mobile first." View Now

The worst security SNAFUs of 2013
This year's award for "Biggest Security SNAFU" can only go to the National Security Agency. Since June, NSA officials have winced as former NSA contractor Edward Snowden began dispensing secrets to the media about how NSA carries out massive surveillance around the world using advanced technology. Read More

INSIDER
Is open source encryption the answer to NSA snooping?
When Unisys CISO John Frymier came in to work on Friday, Sept. 6, the phones were ringing, and continued to ring all day. Customers were panicking over the news headlines of the day before. Read More

The weirdest, wackiest and coolest sci/tech stories of 2013
From bathroom malware and the mystery Google barge to Chinese Moon landings and humanoid robots it has been one wacky high-tech year Read More

The 8 hottest security stories of 2013
We recap the biggest security news from this past year Read More

Juniper vs. Palo Alto Networks: Firewall court battle set to begin
Call it the fist fight over firewalls for 2014. Juniper Networks is going for a knock-out against rival Palo Alto Networks in a patent-dispute lawsuit related to next-generation firewalls that's set to go to trial in Delaware in February. And Palo Alto wants to take out Juniper in its own separate patent lawsuit. Read More


WHITE PAPER: IBM

Proactively Manage Business Applications and User Experience
The comprehensive, integrated IBM portfolio of application performance management solutions enables IT to move beyond basic resource monitoring to optimize infrastructure performance and availability through the use of best practices for identifying and resolving infrastructure problems. Read Now

Blue Coat acquires anti-malware firm Norman Shark
Blue Coat Systems today announced it has acquired anti-malware firm Norman Shark for an undisclosed price, in order to integrate its technologies, such as sandboxing, into other security products available through Blue Coat. Read More

Target's statement to customers on massive data breach
From retailer Target on December 19, 2013 Read More

Notable deaths of 2013 from the worlds of technology, science & inventions
In memoriam: Computing pioneers with roots at Apple and IBM pass, as do brilliant young Internet innovators Read More

Gotcha! FBI launches new biometric systems to nail criminals
Nearly 80 years after it began collecting fingerprints on index cards as a way to identify criminals, the Federal Bureau of Investigation is moving to a new system that improves the accuracy and performance of its existing setup while adding more biometrics. Read More

Unique malware evades sandboxes
Malware utilized in the attack last month on the developers' site PHP.net used a unique approach to avoid detection, a security expert says. Read More


WHITE PAPER: Netscout Systems Inc.

Adopt a More Service-Oriented Management Strategy
The survey results in this report demonstrate dramatic changes happening in IT service management delivery and highlight best practices to assure performance of business processes, deliver exceptional end-user experiences, optimize existing infrastructure, and speed the deployment of new technologies and services. Learn More.

Older Mac webcams can spy without activating warning light, researchers find
Most webcams have a warning light that indicates when they're active, but it's possible for malware to disable this important privacy feature on older Mac computers, according to research from Johns Hopkins University (JHU) in Baltimore. Read More

Most iPhone users have activation lock enabled, survey finds
Four out of five iPhone users have enabled a feature that allows them to locate, lock and wipe their phones if they are lost or stolen, according to the results of a survey by the San Francisco district attorney's office. Read More

5 strategies for post-holiday BYOD problems
Christmas is fast approaching. Now, and after the office is back to normal after the first of the year, employees are going to return with several shiny new gadgets, along with the expectation that they'll "just work" in the corporate environment. Security will be a distant afterthought, because it's still viewed as a process that hinders productivity. Read More

Good guys should compete with criminals in buying zero-day vulnerabilities, report says
An effective way to significantly improve software security is to compete head-to-head with the black market for previously unknown vulnerabilities, a security research company says. Read More

Advanced persistent threats now hitting mobile devices
Smartphones, tablets and other mobile devices have become the target of malware and are even getting hit by highly targeted attacks known as "advanced persistent threats" that intended to steal sensitive data, according to a survey of 676 IT and security professionals. Read More

2013 tech news quiz
Snowden, Ballmer, 3D handguns, iPhone 5s – this year had it all Read More


SLIDESHOWS

Avaya builds massive Wi-Fi net for 2014 Winter Olympics

BYOD for 30,000 people creates extraordinary demands on the network.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Target says 40 million cards likely skimmed in security breach

2. The weirdest, wackiest and coolest sci/tech stories of 2013

3. What Microsoft did right and wrong in 2013

4. Frustrated users complain about SkyDrive problems after Windows 8.1 update

5. New DDoS malware targets Linux and Windows systems

6. University of Florida gets 100Gbps link to Internet2, upgrades campus research net to 200Gbps

7. Microsoft warns customers to update to Windows 8.1 final or face ruin

8. Cisco teams with VMware, Citrix to counter Amazon's new cloud-based desktop

9. 8 products you should not rush to upgrade

10. FIRST LOOK: Gigabit Wi-Fi adapters


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: