Monday, August 04, 2014

Hexadite's Automated Incident Response Solution narrows the gap between detection and response

How to Select IT Talent in a Merger | Grammarly: How to make your organization's messaging make sense

Network World IT Best Practices

Forward this to a Friend >>>

Hexadite's Automated Incident Response Solution narrows the gap between detection and response
This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  It has become fairly clear that one of the largest data breaches of 2013 occurred, in part, because no one followed up on an automated alert from a breach detection system. Like many other companies, this organization was overwhelmed by incident alerts that come by the hundreds or thousands every day.It can take hours, days and sometimes even weeks to thoroughly investigate and remediate an event that is raised by an alert. Moreover, the skills needed to respond to a security alert are fairly high. Many organizations are in desperate need of a way to respond to at least some of their alerts in an automated way in order to free up their highly skilled people to address the most serious and complex incidents.To read this article in full or to leave a comment, please click here Read More

WEBCAST: Cisco Systems

Innovations that Protect Against Advanced Attackers
This webinar will explore new technologies and process for protecting endpoints from advanced attackers and how innovations like continuous data collection combined with big data analytics are pushing the envelope for what security teams can do during and after an advanced attacker puts them in their sights. Learn more >>

WHITE PAPER: Mobiquity Inc.

Five Steps to Developing a Successful Mobile Strategy
Don't lose time and money with a "throw an app against a wall to see if sticks" approach to mobile. It won't work. You need a well-thought-out strategy to take full advantage of mobile. This white paper lays out the five important steps to a robust enterprise mobile strategy. Learn more.

How to Select IT Talent in a Merger
One of a CIO's biggest leadership challenges is retaining the best IT talent in the throes of a merger, acquisition or divestiture. Read More


Bridging the Gap Between Business and IT
There's a growing gap between business users and IT services. Differences between what users want and what IT can provide are driving a wedge between these two camps. Learn how this gap can be closed with the RES IT Store delivering automation in an easy-to-use and easy-to-implement package. Learn more

Grammarly: How to make your organization's messaging make sense
Let's face it; most people's writing, whether it's memos, email messages, reports, or whatever, is, at best, poor (and in many cases downright atrocious). A new service, Grammarly, can go a long way to fixing the problem. Read More


Contain costs and increase operational efficiency
Increasing line of business demands? Shrinking IT budget? See how Red Hat can help you meet growing. Read Now

How to Repair Broken Relationships with Co-Workers
Bad relationships are bound to happen from time to time. In the workplace, they are typically based on fear and insecurity. However, you can repair them with a little work. Here are three things you do always, sometimes and never do. Always remember that bad behavior comes from fear or insecurity. We’re all worried that other people won’t like us or are out to get us, and we’re all afraid that bad things will unexpectedly come our way. The best human relationships eliminate these two fears. A good coworker is someone who you know will not purposefully do things that damage you and will act in ways that you can predict. We call this “trust” in our personal lives. So build trust by showing that you won’t purposefully hurt others, even when you feel bumped or bruised. Make sure your actions appear understandable and predictable.To read this article in full or to leave a comment, please click here Read More

Architectural Firm Puts Giant Data Files in the Cloud
Perkins and Will, like many other global architectural firms, is struggling to manage ever-growing volumes of information. Data-intensive applications such as building information modeling (BIM) produce enormous files on a regular basis.The firm, which operates in six countries, has about 150 terabytes of critical data—80 percent of which is in BIM files of up to 300 megabytes each. And the volume of data is growing fast. In about three years, data volume is expected to reach 400 terabytes, says CIO Murali Selvaraj.Perkins and Will executives determined in 2013 that traditional storage options could no longer meet the -company’s needs. Many of the firm’s building projects involved multiple offices, and its architects were spending a lot of time waiting for models to open or to synchronize files with the central office.To read this article in full or to leave a comment, please click here Read More

CIOs Describe Turning Points In Their Careers
How do top CIOs get that way? For many, the path to greatness includes a turning point—a moment when the landscape shifted under them and they learned lessons that served them throughout their careers. We asked a few of the 2014 inductees into the CIO Hall of Fame to recount some of those moments.For Peter Weis, global CIO and vice president of supply chain at Matson Navigation, the turning point came at age 26, during a conversation with his boss at the time. Weis was already in management, working at an entrepreneurial unit within a larger business. His boss was straightforward and driven.+ ALSO ON NETWORK WORLD Inside CIO paychecks +To read this article in full or to leave a comment, please click here Read More


Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.


As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn


1. Why TCP/IP is on the way out

2. Linux will not become a gaming platform, it already is one

3. 20 cool things you can do with a Raspberry Pi

4. Some are twisting the facts in requests to be forgotten, Google says

5. Top 20 colleges for computer science majors, based on earning potential

6. The best cities for landing top pay for your tech skills

7. Black Hat 2014: How to crack just about everything

8. Federal court system warns of new e-mail jury scam

9. 10 disturbing attacks at Black Hat USA 2014

10. Half of surveyed US businesses shun SDNs

Do You Tweet?
Follow everything from on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact:

To contact Network World, please send an e-mail to

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to **

No comments: