Monday, June 16, 2014

Three best practices for reducing the risk of SQL injection attacks

HP CIO Ramon Baez sees your future in the cloud | IT grads get to know GE

Network World IT Best Practices

Forward this to a Friend >>>


Three best practices for reducing the risk of SQL injection attacks
This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  SQL injection attacks have been around for more than 10 years. Database security experts know they are a serious problem. Now a recently unsealed Second Superseding Indictment against a notorious group of Russian and Ukrainian hackers shows just how damaging this type of attack can be.The indictment provides a long list of companies that have suffered costly data breaches where the root cause has proven to be a SQL injection. According to the indictment:To read this article in full or to leave a comment, please click here Read More


WEBCAST: IBM

Reinventing Storage Efficiency!
Live event: Tuesday, June 17, 2014 1 PM ET / 12 PM CT / 10 AM PT What if you could reduce your storage costs by half? Attend this webcast to hear how you can maximize the economics of your data center by modifying your storage footprint and power usage using Flash Storage, and to learn how IBM is accelerating storage efficiency. Register Now

WHITE PAPER: LogMeIn

The State of the Web Conferencing Market
Businesses today are experiencing landmark shifts. The emergence of mobile, social, and virtual communications is creating more distributed and real-time work environments. User demand for collaborative tools is growing exponentially. The adoption of Web conferencing is triggered by three key drivers. Read this Frost&Sullivan report to learn more. Read Now

HP CIO Ramon Baez sees your future in the cloud
In this Q&A, Baez explains how CIOs can make the most from the cloud and big data. Read More

INSIDER
IT grads get to know GE
At GE, a global IT recruiting program helps bring new computer science graduates into the company and expose them to different facets of the business.Computer science graduates rotate through four different IT assignments during a two-year program at General Electric. Read More


WHITE PAPER: Damballa

Finding Advanced Threats Before They Strike
Enterprise security teams are on a high state of alert to keep up with ever-morphing advanced threats. This SANS Institute review shows how Damballa Failsafe can be the first and last line of defense. Read Now

The 12 biggest gaffes by high-tech execs
The 'oops!' heard 'round the worldLate last week, Apple CEO Tim Cook tweeted a photo of himself touring a Texas factory that produces Mac Pros. Nothing special, right? Until you looked behind him and spied a pair of iMacs running Windows. Oops.To read this article in full or to leave a comment, please click here Read More

Does the data center need an OS?
Some may, others don't. But everyone can benefit from automation Read More


WHITE PAPER: Network Instruments

Your Guide to Troubleshooting VoIP
Real-time voice communications are sensitive to delay and variation in packet arrival times. This paper guides you through the essentials of VoIP troubleshooting, including common problems as well as the metrics you should employ to fix and prevent them. Learn More

Why database monitoring may, or may not, secure your data
A majority of IT security pros believe that continuous monitoring of the database network is the best approach to prevent large-scale breaches like the ones that occurred at retailers Target, Michaels and Neiman Marcus, a study showed. Read More

How to Clean Up Your IT Resume
As spring comes to a close, it's an ideal time to clear the clutter from your resume. It's key to make sure you present only relevant, current information in the most attractive way possible. Here, three experts weigh in on what to toss out and what to keep. Read More

This IT worker had to train an H-1B replacement
U.S. workers protested job losses to foreign workers by displaying American flags in their cubicles Read More


SLIDESHOWS

Network World's 2014 State of the Network survey

Exclusive research from Network World shows that cloud and mobility are gaining in importance.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Chambers to retire this fall?

2. Behind the Great Firewall: What it's really like to log on from China

3. What's the best approach to building next-generation data center networks?

4. 13 geeky ways to celebrate Friday the 13th

5. Amazon AWS continues to use TrueCrypt despite project's demise

6. Hackers use pathetic passwords just like everyone else

7. Docker 101: What it is and why it's important

8. Microsoft developing smartphone batteries that can last a week

9. Biggest, baddest, boldest software backdoors of all time

10. Dell executive says HP's new Machine architecture is 'laughable'


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment