Friday, April 18, 2014

How a cyber cop patrols the underworld of e-commerce

Top techie college commencement speakers: 2014 | Big bucks going to universities to solve pressing cybersecurity issues

Network World Compliance

Forward this to a Friend >>>


How a cyber cop patrols the underworld of e-commerce
Melissa Andrews, a resident of Canada, is a cyber security "cop" for Payza, an international e-commerce payment platform operating in 97 countries. Her job, described by the company's public relations firm as "the worst security job on the Internet," is to protect the public from illegal, and many times revolting, content, by shutting the sites down and alerting authorities about criminal activity. She spoke with CSO this week about her job and why she is proud of what she does. Read More


WEBCAST: CA Technologies

LIVE EVENT: 5/7, The End of Data Protection As We Know It.
Traditional backup is going away, but where does this leave end-users? Learn more!

WHITE PAPER: Google Apps

Radicati: Cloud Business Email - Market Quadrant 2013
Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google Apps for Business leads the pack in both functionality and estimated adoption. Learn more!

Top techie college commencement speakers: 2014
Bill and Melinda Gates head up list of big names in tech giving college commencement addresses Read More

Big bucks going to universities to solve pressing cybersecurity issues
During a week in which everyone seemed to be searching for answers amid revelations of the Heartbleed bug, several universities and their partners announced new efforts to explore IT security advances. Read More

INSIDER
7 reasons to deploy Wi-Fi security in Enterprise mode
Although it's tempting to use the Personal mode of Wi-Fi security, which is easy to setup and use, businesses and organizations really need to use the Enterprise mode of WPA2—also known as 802.11i. Although it requires a RADIUS server to do the 802.1X authentication and is more complex to setup, it provides superior Wi-Fi security and can save you time and money in the long run. Read More


WHITE PAPER: VCE

Power Plant Achieves Required High-Availability with VCE
Faced with an external compliance audit and the need to improve availability, one of Europe's largest power plants turned to VCE Vblock™ Systems to: - Transform twin data centers to active-active mode - Enable business continuity and reliable delivery of electricity - Virtualize 95% of applications Learn More

Here are the options with Heartbleed-flawed networking gear (Hint: there aren't many)
Companies faced with the threat posed by networking equipment that contains the notorious Heartbleed bug have few security options beyond working closely with affected vendors, most notably Cisco Systems and Juniper Networks. Read More

Fortinet, McAfee, Trend Micro, Bitdefender battle in socially-engineered malware prevention test
Socially-engineered malware tries to trick users into downloading and executing malicious code through tactics that include everything from fake antivirus to fake utilities to fake upgrades to the operating system and trojanized applications. NSS Labs tested several endpoint security products to see how well each would block these attacks. Read More

How to defend against the OpenSSL Heartbleed flaw
CSOs need to take a number of steps as soon as possible to protect their organizations against the OpenSSL vulnerability that has shaken the tech industry, experts say. Read More


WHITE PAPER: CDW

Software Asset Management: Practices for Success
This white paper discusses best practices that can dramatically increase your success rate of a SAM deployment. Make sure and follow these steps and verify that your SAM toolkit has the necessary functionality to keep your organization steps ahead of the competition -it's a long term investment. Read Now

Kimberly Clark names new CISO
Timothy Youngblood, CISSP, has joined Kimberly Clark as their Chief Information Security Officer. Kimberly Clark is multi-national brand conglomerate with staple consumer products such as Kleenex, Pull-ups, and Scotts Towels. Read More

Secure browsers offer alternatives to Chrome, IE and Firefox
The Web browser has been a major infection vector for years, allowing malware to be transported to millions of computers through phishing, man-in-the-middle, SQL injection and countless other attacks. But what if there were a way to stop this madness and secure the browsing channel itself? Read More

Your no-fuss, fail-safe guide to protecting Android devices
As Android's popularity continues to climb, it's increasingly joining the workplace. In its early days, Android had little in the way of security, relegating it to personal use. But over the years, Google has upped the ante in terms of Android security, as have third-party vendors. Read More

Schneier: Internet has delivered a 'golden age of surveillance'
"Information is power," has been true for so long that it has become a clichA(c). Read More

Meet the 2014 Internet Hall of Fame Inductees
Father of the Mouse, Father of DSL among honorees Read More


SLIDESHOWS

10 Big Data startups to watch

These 10 startups to watch were chosen based on third-party validation, experience, and market potential.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. The IRS uses computers?! The horror!

2. First look: Ubuntu 14.04 LTS

3. Fortinet, McAfee, Trend Micro, Bitdefender battle in socially-engineered malware prevention test

4. Still deploying 11n Wi-Fi? You might want to think again

5. How users are fixing Windows 8.1 Update install problems

6. 9 Things You Need to Know Before You Store Data in the Cloud

7. Heartbleed bug is irritating McAfee, Symantec, Kaspersky Lab

8. Docker becomes de facto Linux standard

9. Kill switches coming to iPhone, Android, Windows devices in 2015

10. Microsoft releases new-and-improved Threat Modeling Tool 2014


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: