Friday, January 17, 2014

How to securely get started using SDN

10 common misconceptions about security professionals | Cisco: Thousands of web hosting centers now launchpads for attacks

Network World Compliance

Forward this to a Friend >>>


How to securely get started using SDN
Though some might argue that it's inherently insecure, SDN has changed for the better in recent years, allowing it to be implemented securely Read More


WHITE PAPER: APC by Schneider Electric

Specification of Modular Data Center Architecture
There is a growing consensus that conventional legacy data center design will be superseded by modular scalable data center designs. This paper creates a framework for modular data center architecture and describes the various ways that modularity can be implemented for data center power, cooling, and space infrastructure. View now

In this Issue


WHITE PAPER: APC by Schneider Electric

Types of Prefabricated Modular Data Centers
There are important distinctions between the types of data center factory-built building blocks on the market. This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, and compares their key attributes. View more

10 common misconceptions about security professionals
When it comes to working in security, there are plenty of misconceptions in the public. Many can be blamed on Hollywood, business speculation, and pure imagination.CSO recently spoke to Chris Eng and Chris Wysopal from Veracode, Sanjay Beri from Netskope, and Andrew Wild from Qualys, to get their views on some of the misconceptions about working in and around security. Read More

Cisco: Thousands of web hosting centers now launchpads for attacks
Web hosting centers around the world are being compromised by cyber-criminals that use them to launch major attacks against business and government, says Cisco in its annual security report. This threat really gained full steam last year, the company says. Read More

Security startup Impermium joining Google
Security company Impermium has joined Google to help boost the Internet giant's already considerable expertise in countering spam and abuse. Read More

Cisco fixes remote access vulnerabilities in Cisco Secure Access Control System
Cisco Systems has released software updates for its Cisco Secure Access Control System (ACS) in order to patch three vulnerabilities that could give remote attackers administrative access to the platform and allow them to execute OS-level commands without authorization. Read More

Enterprise Organizations Describe Weaknesses in Malware Detection and Protection
Well here we are halfway through January and you can't cross the street without hearing about a malware attack or security breach somewhere – Neiman Marcus, Target, Yahoo, Yikes! When my non-technical friends ask me what they should expect moving forward, I'm not exactly a beacon of hope. My usual response is something like, "get used to it, things will likely get worse." Read More


WEBCAST: IBM

Fighting Fraud Videos: IBM Intelligent Investigation Manager
Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both the commercial and public sector space. Learn More.

New Blackphone promises secure communications and privacy
Playing on mobile users' fears of commercial and government surveillance, two companies are building a phone they say is designed to protect privacy. The joint venture between smartphone manufacturer Geeksphone and encrypted communications provider Silent Circle will unveil the new device called Blackphone at the Mobile World Congress show in Barcelona next month. Read More

Security Chalk Talk: Malware Protection Techniques Overview
Dr. Zulfikar Ramzan discusses the overview of the techniques used to spot and protect systems from malware, including signatures, heuristics and behavior, as well as how features like whitelisting and reputation can prevent false positives. Read More

The worst data breach incidents of 2013
These businesses and government agencies lost the most personal and financial records due to hackers or security mishaps last year Read More

Snapchat, Bitly and Kik Messenger targeted by spammers
You have to give spammers credit for effort: Symantec found a spam campaign that manages to abuse three Web services at the same time. Read More

SD cards are hackable, but probably not on a mass scale
All threats are not equally threatening. Read More


WHITE PAPER: Dell and Oracle

Database Backup using NetVault™ Backup and PowerVault MD3260
This paper is intended to show the process used to backup and easily restore SQL Server and Oracle databases using a combination of Dell NetVault Backup software, the Dell PowerVaultTM MD3260 storage array, and the Dell PowerEdgeTM R620 rackmount server. Read now>>

Massive denial-of-service attacks pick up steam, new nefarious techniques
Several online gaming sites were recently hit by distributed denial-of-service (DDoS) attacks that used a new type of assault on the victims: a Network Time Protocol Amplification Attack. Read More

Fortinet wireless security gateway can now track, entice shoppers
Retail store managers would like to know, in real time, how many shoppers enter their premises and what they are likely interested in buying. Security firm Fortinet, which makes the FortiGate threat-management gateways that include a wireless access point, says its gear can now pick up the presence of shoppers' smartphones in order to provide retailers a real-time view of where shoppers go in stores. Read More

RSA boycott splits security industry on tactic's effectiveness
The handful of security experts boycotting the upcoming RSA Conference have split the industry between those who believe the protest is justified and others who see it as a knee-jerk reaction to reports of RSA collaboration with the U.S. National Security Agency. Read More

T-Mobile's John Legere: Genius, joker or jerk?
Rebel T-Mobile CEO riles rivals, adds much needed life to tech executive ranks Read More

How to rescue your PC from ransomware
With the nasty CryptoLocker malware making the rounds--encrypting its victims' files, and then refusing to provide the unlock key unless a payment of $300 is made via Bitcoin or a prepaid cash voucher--ransomware is back in the spotlight. Read More

12 famous passwords used through the ages
Passwords seem like a recent thing, but they've been in use for a long time. Here are a dozen of the more memorable ones Read More


SLIDESHOWS

The worst data breach incidents of 2013

These businesses and government agencies lost the most personal and financial records due to hackers or security mishaps last year.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. How to make 96,000 pounds of WWII machinery into high-tech research platform

2. Microsoft Hyper-V bangs away at VMware's popularity

3. Cisco offers advice on Target breach

4. Relive the 1990s with these ancient, still-functioning websites

5. The mixed fate of Sun tech under Oracle

6. SDN will never happen, says VMware exec

7. Juniper should reevaluate switching, security products investor says

8. 18 great uses for an old Android device

9. Chrome 32: First look

10. Massive denial-of-service attacks pick up steam, new nefarious techniques


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: