Friday, September 12, 2014

Security tops CIO worries; IT budgets, turnover on the rise

What online news looked like on 9/11 | Ernst & Young accused by Canadian used computer dealer of data breach

Network World Compliance

Security tops CIO worries; IT budgets, turnover on the rise
CIOs are spending more on IT, worrying most about security and privacy, and staying on the job a little longer, according to the latest data from the Society for Information Management (SIM).  The 2015 SIM IT Trends Study isn’t available in its entirety, but researchers released preliminary findings in advance of the full release in early November. +ALSO ON NETWORKWORLD: Tech’s top-paid CEOs | CIOs rack up millions in incentives | Priciest perks | Top 20 colleges for computer science majors +To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: OPSWAT Inc.

Secure the Use of Portable Media in Critical Infrastructure
Securing critical infrastructure is crucial to ensuring that our current way of life is sustained. Our whitepaper provides insight into the development of strong security policies around the use of portable media, and how to effectively mitigate the threat from external sources. Learn more

WHITE PAPER: CradlePoint

Mitigating Security Risks at the Network's Edge
This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks. Learn More

What online news looked like on 9/11
With Twitter, Facebook and YouTube yet to come, newspapers and TV sites played pivotal role Read More

Ernst & Young accused by Canadian used computer dealer of data breach
A used computer dealer in Canada claims he discovered a trove of Ernst & Young customer business data on Dell servers bought back in 2006 -- and he wants the global consultancy to pay him to return the data. But is the breach for real or just a hoax? Read More

INSIDER
How to lure tech talent with employee benefits, perks
Companies are vying for IT talent, and they’re using benefits and perks to help attract the best and brightest. So what are IT pros looking for?To read this article in full or to leave a comment, please click here(Insider Story) Read More

Five million Gmail addresses and passwords dumped online
The data was not likely stolen from Google, but from other websites, researchers said Read More


WHITE PAPER: Citrix

Extending benefits of desktop virtualization to mobile users
Desktop virtualization is attractive to organizations of all types and sizes because of its many compelling benefits, such as significantly reducing operating costs while strengthening data security and enhancing IT responsiveness to rapidly changing business conditions. However, there is a gap in coverage that exists for mobile laptop users. Learn More

Encryption failures fixed in popular PGP email security tool Enigmail
Users of Enigmail 1.7 are advised to upgrade to version 1.7.2 as soon as possible Read More

Home Depot confirms breach of its payment systems
Customers will not be held responsible for fraudulent charges, the company said Read More

VMware patches third-party components in vSphere platform
VCenter Server and ESXi patches update the bundled versions of Apache Struts, Apache Tomcat, glibc and JRE Read More

Study concludes 'Heartbleed' flaw was unknown before disclosure
Network traffic records show no signs attackers were looking for vulnerable servers before Heartbleed's disclosure Read More


WHITE PAPER: Fortinet

Security Concerns in the C-Suite
Next-generation firewall technology (NGFW) addresses the most prevalent security issues. Fortinet's FortiGate NGFW integrates five crucial security protections, including strong authentication, antimalware and APT detection. View Now>>

Microsoft Patch Tuesday thwarts nosey malware
This month's round of Patch Tuesday updates includes a critical fix for Internet Explorer Read More

Salesforce warns customers of malware attack
A new version of the Dyreza online banking Trojan is stealing Salesforce.com log-in credentials Read More

How Apple Pay could make the Target and Home Depot breaches a thing of the past
The launch of Apple’s mobile payment system could prove a turning point in the battle to secure your debit and credit card information from hackers.Tens of millions of card numbers have been stolen in the last few months from malware-infected payment terminals in stores including Target and Home Depot. The thefts were possible in part because the card information gets stored in an unencrypted form inside the terminals.Apple announced a system this week, one that uses a payment standard based on NFC technology. When users of its new iPhone 6 and iPhone 6 Plus smartphones walk into a store, they’ll be able to wave their phone over an NFC reader to complete a purchase.To read this article in full or to leave a comment, please click here Read More

28 crucial checks to make before launching your Web site
Read More


SLIDESHOWS

7 sexy smartphone technologies coming your way

A slew of new technological features are (or could be) coming to future smartphones. Here are seven that have been in the news over the last few years.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Windows 9 to users: I'm listening

2. Five million Gmail addresses and passwords dumped online

3. Internet of Overwhelming Things

4. What online news looked like on 9/11

5. Man arrested on drug charges after butt-dialing 911

6. The Linux desktop-a-week review: ratpoison

7. iPhone 6, Apple Watch features: Android's been there, done that

8. 5 questions to ask before you take a tech job

9. Last-minute iPhone 6 rumors: Release date, water proof, shatter proof and more

10. First Look: iPhone 6 and iPhone 6 Plus


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment