Friday, January 10, 2014

Worst data breaches of 2013

Cryptolocker scrambles eight years of data belonging to US town hall | The 7 best habits of effective security pros

Network World Compliance

Forward this to a Friend >>>


Worst data breaches of 2013
These businesses and government agencies lost the most personal and financial records due to hackers or security mishaps last year Read More


WHITE PAPER: APC by Schneider Electric

Specification of Modular Data Center Architecture
There is a growing consensus that conventional legacy data center design will be superseded by modular scalable data center designs. This paper creates a framework for modular data center architecture and describes the various ways that modularity can be implemented for data center power, cooling, and space infrastructure. View now

In this Issue


WHITE PAPER: APC by Schneider Electric

Types of Prefabricated Modular Data Centers
There are important distinctions between the types of data center factory-built building blocks on the market. This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, and compares their key attributes. View more

Cryptolocker scrambles eight years of data belonging to US town hall
The Cryptolocker ransom Trojan has claimed another victim in small-town America, scrambling eight years-worth of files held by a New Hampshire town authority. Some are believed to be irretrievable. Read More

The 7 best habits of effective security pros
Today's information security professionals need to learn more swiftly, communicate more effectively, know more about the business, and match the capabilities of an ever-improving set of adversaries. But, it doesn't seem too long ago that all it took to survive in the field was a dose of strong technical acumen and a shot of creativity to protect the network, solve most problems, and fend off attacks. Read More

World of Warcraft attack highlights two-factor authentication weakness
New malware targeting users of the online role-playing game World of Warcraft exploits a weakness that exists in many forms of two-factor authentication. Read More

Best of CES 2014: In Pictures
Here's what's grabbing our attention right now at the sprawling CES 2014 gadget show in Las Vegas Read More

INSIDER
CIOs and CMOs: Power couple or strange bedfellows?
Marketing departments are shifting significant amounts of their own budgets toward IT-related products and services, independent of what the IT department spends, to the extent that Gartner predicts that by 2017 chief marketing officers (CMO) will spend more money on IT than chief information officers (CIO). Read More


WHITE PAPER: Salesforce.com

5 Ways to Improve Outbound Sales
Forget the numbers game and learn how to find success by relying on quality interactions. In this eBook, we'll give you 5 ways to improve outbound sales performance and ultimately increase your sales pipeline. Download now. Learn more>>

A look at FireEye's Mandiant buy: Game changer or not?
FireEye's acquisition of Mandiant is getting generally positive reviews from industry analysts, though some caution that FireEye faces a big challenge in its goals related to blending the two security firms' products. Read More

Why one company declined cloud-based 'crisis communications system'
Cloud-based services are still often seen as too risky for sensitive information. Take the case at Kingsport, Tenn.-based Eastman Chemical Company, which said "no" to the cloud when designing its new crisis communications system. Read More

NSA scandal spooking IT pros in UK, Canada
The National Security Agency's massive data collection practices that have come to light in the past six months have apparently spooked at least some businesses in Canada and the United Kingdom, based on a survey out today that says many are moving their company's data away from the U.S. due to "the NSA surveillance scandal." Read More

NSA critic Bruce Schneier joins security firm Co3 as CTO
The network security industry's legendary free thinker Bruce Schneier Monday said he's taken a job as CTO at Co3 Systems, but that this in no way will curtail his determination to speak and write candidly on important topics such as the National Security Agency's (NSA) practices. Read More

Governments urged to set up global bounty system to buy security vulnerabilities
The criminal market for software vulnerabilities is now so sophisticated and dangerous that governments should consider setting up a global programme to purchase flaws before they fall into the wrong hands, a researcher has argued. Read More


WHITE PAPER: AT&T

Four Keys to Choosing a Holistic Mobile Management Solution
Getting peak value from mobile technologies takes a wide range of applications and services. Here are four capabilities every end-to-end mobile management solution must include. Learn More

As Yahoo makes encryption standard for email, weak implementation seen
Yahoo has started to automatically encrypt connections between users and its email service, adding an important security layer that rival Gmail has had for almost four years, but its implementation needs work, according to at least one security expert. Read More

Intel announces death of McAfee brand. Will it be that simple?
Three and a half years after Intel acquired McAfee, the chip giant looks set to ditch the famous brand that still bears the name of its colourful founder, John McAfee. Read More

7 ways to work around security compliance problems
Regulations aimed at protecting the security and privacy of organizations and individuals are well meaning. But sometimes these standards, or how they're interpreted, can be more than a nuisance--they can actually contribute to weaker security. Read More

Cryptolocker 2.0 turns into worm that spreads via USB drives
Security researchers have discovered what looks like a copycat version of the Cryptolocker ransom Trojan that drops some of the malware's sophistication in favour of the single innovation of being able to spread via USB drives. Read More

Report: NSA looking to crack all encryption with quantum computer
The U.S. National Security Agency is attempting to build a new breed of supercomputer that theoretically could make short work of cracking most keys used for encrypted communications. Read More

The NSA blame game: Singling out RSA diverts attention from others
RSA may have earned much of the criticism being heaped upon it for allegedly enabling a backdoor in one of its encryption technologies under a contract with the National Security Agency. But singling out the company for reproach deflects attention from the role that other technology vendors may have had in enabling the NSA's data collection activities. Read More

7 security mistakes people make with their mobile device
Mobile devices, especially smartphones, have ushered businesses into a new era of productivity and working on-the-go. But with those advances and added convenience comes a wealth of security blunders just waiting to happen. Here are some of the worst mistakes users can make with their mobile devices and how to avoid them. Read More


SLIDESHOWS

2014's 25 Geekiest 25th Anniversaries

A look back at the most memorable tech-related happenings of 1989.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Best of CES 2014: In Pictures

2. Cloud's worst-case scenario: What to do if your provider goes belly up

3. Riverbed may go private in a $3 billion deal

4. SDN showdown: Examining the differences between VMware's NSX and Cisco's ACI

5. The 7 best habits of effective security pros

6. Analyst: Save millions, don't renew Microsoft Enterprise Agreements

7. Intel announces death of McAfee brand. Will it be that simple?

8. Why can't Microsoft find a CEO?

9. The nerdiest, most high-tech business card you've ever seen

10. CIOs and CMOs: Power couple or strange bedfellows?


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment