Friday, March 14, 2014

Can anti-virus technology morph into breach detection systems?

Best ways to Celebrate Pi Day 2014 | IPv6 could open networks up to zero-day attacks

Network World Compliance

Forward this to a Friend >>>


Can anti-virus technology morph into breach detection systems?
Anti-virus software is still often considered a "checkbox" item for enterprise deployments, especially on Microsoft Windows, but over the decades, anti-virus software changed to do far more than just signature-based virus blocking. Today, the question is whether the type of anti-malware product that evolved from virus checking can transform again to be a part of a "breach detection system," or BDS Read More


WHITE PAPER: IBM Corporation

Extreme Warehouse Speed for Fast Business Decisions
Informix ebook highlighting benefits of making decisions 'at the speed of business'; and discusses optimizing warehouse performance; and simplifying resources View Now

In this Issue


WEBCAST: IBM Corporation

Solving the Big Data Challenge of Sensor Data
This webcast will focus on sensor data applications and IBM's differentiated offering to solve the IT challenges of sensor data for better business insight and competitive advantage. Highlights include unique attributes of sensor data and the big data challenges they present. View Now

Best ways to Celebrate Pi Day 2014
Pi is 3.14 (about), so that makes March 14 Pi Day Read More

INSIDER
IPv6 could open networks up to zero-day attacks
The National Institute of Standards and Technology (NIST) warns that moving from IPv4 to IPv6 is a process fraught with peril, which may explain why government agencies are so far behind their own deadlines for implementation. Read More

Researchers pocket record $400K at Pwn2Own hacking contest's first day
Researchers cracked Microsoft's Internet Explorer 11, Mozilla's Firefox and Adobe's Flash and Reader at the Pwn2Own hacking contest, earning $400,000 in prizes, a one-day record for the challenge. Read More

Juniper Networks not giving up firewall patent fight vs. Palo Alto Networks
Juniper Networks' legal battle against Palo Alto Networks claiming infringement of application-firewall patents ended in a mistrial being declared in a Delaware court, but Juniper says it intends to haul Palo Alto back into court again. Read More

Top 5 skills needed for a SOC analyst
Building a Security Operations Center (SOC) from scratch or revamping an underperforming one is a daunting leadership challenge. Of all the tasks you have to think about, finding and hiring a set of SOC analysts with the right skill set has to be a top priority. Read More


WHITE PAPER: IBM Corporation

Forrester Total Economic Impact of Optim Solutions
In this 2013 study, Forrester Consulting examines the total economic impact and potential return on investment (ROI) that organizations may realize by deploying IBM InfoSphere Optim data lifecycle management solutions for Data Growth and Test Data Management. View Now

Why you need to segment your network for security
Pen tester Mark Wolfgang argues segmenting for security is a key piece of an overall defense-in-depth strategy. Here he explains why and how to accomplish it in your organization (registration required) Read More

Products of the week 03.10.14
Our roundup of intriguing new products from companies such as NCP and CipherCloud Read More

IE zero-day flaw shows kinks in Microsoft patching
The speed at which cybercriminals exploited an Internet Explorer vulnerability discovered in mid-February and finally patched Tuesday demonstrates the snags in Microsoft's security update system. Read More

Virtual machine (VM) security still a work in progress
Trying to protect your expanding virtual machine (VM) empire will require a security product that can enforce policies, prevent VMs from being terminated or infected, and deliver the virtual equivalents of firewalls, IPS and anti-virus solutions. Read More

A clear-eyed guide to Mac OS X's actual security risks
Apple has improved its security in recent years, but is it enough? Read More


WHITE PAPER: IBM Corporation

The MDM advantage: Creating insight from big data
Analyze big data in a timely manner, match it to master data, and derive actionable information to extract insights and make better business decisions. View Now

Navy network hack has valuable lessons for companies
The hacking of a U.S. military network that was made easier by a poorly written contract with Hewlett-Packard offers lessons on how negotiations between customer and service provider could lead to weakened security. Read More

The greatest security story never told -- how Microsoft's SDL saved Windows
Microsoft has launched a new website to "tell the untold story" of something it believes changed the history of Windows security and indeed Microsoft itself a the Software Development Lifecycle or plain 'SDL' for short. Read More

Android malware detection boosted by university research
With smartphones and tablets increasingly at risk from malware, researchers from North Carolina State University have devised a new and potentially better way to detect it on Android devices. Read More

U.S. retailers insist on PIN requirement in smartcard rules
U.S. retailers are digging in their heels over their need for PIN authentication for Europay MasterCard Visa (EMV) smartcard use here. Read More

How to protect virtual machines (VMs)
These four products represent different approaches to VM security Read More


SLIDESHOWS

How to protect virtual machines (VMs)

These four products represent different approaches to VM security.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Embarrassing stories shed light on U.S. officials' technological ignorance

2. Why IBM thinks Windows Phone is best for the enterprise

3. Computer science enrollments rocketed last year, up 22%

4. The fascinating 50

5. Juniper Networks not giving up firewall patent fight vs. Palo Alto Networks

6. iPhone Air: Latest iPhone 6 concept video has fanboys fired up

7. Massive Bitcoin mining rig earns $8 million per month

8. Cisco shows Rob Ford no respect

9. March 2014 Patch Tuesday: Microsoft closes critical holes in IE, Windows

10. Cisco on mission to outfit all office rooms with video conferencing systems


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment