Friday, April 04, 2014

How to respond to a data breach

10 hot products at DEMO Enterprise | FireEye, AhnLab score low in lab test of breach detection systems

Network World Compliance

Forward this to a Friend >>>


How to respond to a data breach
Data breaches seem to be happening at an absurdly rapid rate these days with reported incidents involving the theft of personally identifiable information hitting 25,566 in 2013 up from 10,481 in 2009. Read More


WHITE PAPER: Sophos, Inc.

Managing BitLocker With SafeGuard Enterprise
This whitepaper explains how Sophos SafeGuard Enterprise secures your data wherever it's stored; and how it allows you to support diverse platforms and encryption products including BitLocker. Learn More

WHITE PAPER: HootSuite Media, Inc.

8 Tips for Social Business
In our 8 Tips for Social Business white paper, you will learn methods to help simplify the progression of your social media's maturity. Learn More

10 hot products at DEMO Enterprise
Google Glass competitors, medical devices, retail apps, 3D printing lead the way. Read More

FireEye, AhnLab score low in lab test of breach detection systems
In an evaluative lab test, FireEye and Ahnlab each scored "below average" on their breach-detection systems (BDS) in a comparative group product test which was conducted by NSS Labs. Read More

Apple patches Safari's Pwn2Own vulnerability, two-dozen other critical bugs
Apple on Tuesday patched the security vulnerability in Safari that was successfully exploited at last month's Pwn2Own hacking contest, where a team cracked the browser to win $65,000. Read More


WHITE PAPER: SAS

Marketing Analytics in Manufacturing
Effective marketing analytics have the ability to leverage big data and break down unstructured customer info to help manufacturers better understand customer needs. Aberdeen Group found that 43% of manufacturers cited finding new ways to serve customers as a primary focus area. This report explores the drivers & benefits of marketing analytics. Learn more

Dark Web: An ever-more-comfortable haven for cyber criminals
Nobody expects the white hats of the IT world to be able to eliminate cyber crime entirely. But, according to McAfee Labs' Threats Report for the fourth quarter of 2013, the good guys are having a tough time even making life difficult for the bad guys. Read More

Trustwave plans to fight "baseless allegations" over Target breach
Last week, Trustmark National Bank and Green Bank NA, filed a complaint in Chicago federal court accusing Target and Trustwave of failing to properly secure customer data, and enabling the theft of 110 million records, including 40 million credit cards. Read More

Whose fault is it that users are the weakest link?
An organization can spend mountains of cash on best of breed network defenses and security tools, but it can all come crashing down with one click from a user. Users are the weakest link when it comes to network and computer security, but a new survey from Globalscape reveals that the users themselves aren't entirely to blame. Read More


WHITE PAPER: HP and Intel® Xeon® processors

Bridging the IT Gap
To overcome today's IT management gap, your organization needs a fresh approach to infrastructure management. There are three key requirements for this new approach to IT management. In this paper, you'll find that three key requirements create the foundation for a management environment that is poised to meet the challenges of a new era in IT. Learn More

Understanding incident response: 5 tips to make IR work for you
IT professionals, security experts, and researchers have traveled to Sin City this week, in order to attend the annual Black Hat security conference. While many of the presentations and demos at Black Hat will focus on trends and the latest technological advances for those who attack the network and those who defend it, there isn't much on the topic of incident response. Read More

Patch management flubs facilitate cybercrime
Failures in patch management of vulnerable systems have been a key enabler of cybercrime, according to the conclusions reached in Solutionary's annual Global Threat Intelligence Report out today, saying it sees botnet attacks as the biggest single threat. Read More

INSIDER
Resume Makeover: How to Highlight Your Personal Brand
Career consultant Donald Burns takes an IT auditor's resume from bland to brand in this month's IT resume makeover. Read More


SLIDESHOWS

Hot products at Interop

These products are on display at the annual tech conference in Vegas.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Grading Google's April Fools' Day

2. Cisco reveals OpenFlow SDN killer

3. Techie April Fools' Day – in pictures

4. Comcast vs. Google: How a potential broadband battle could impact consumers

5. 16 terrible computer pranks that could get you fired

6. Hot products at Interop

7. HP bucks up unified access line to better battle Cisco, others

8. 5 things we love/hate about Fedora 20

9. Google asks US Supreme Court to review ruling on Wi-Fi packet sniffing

10. Microsoft slashes Azure prices, introduces new basic tier


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: