Friday, October 10, 2014

9 employee insiders who breached security

Windows XP flaws help Russian 'Qbot' gang build 500,000 PC botnet | New products of the week 10.06.14

Network World Compliance

9 employee insiders who breached security
These disgruntled employees show what can happen when an employer wrongs them. Read More


WHITE PAPER: Open Text

Global Growing Pains: Tapping into B2B Integration Services
A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities they're seeking in B2B integration partners. Learn More

WEBCAST: Alcatel-Lucent Enterprise

Integrating Mobility with Unified Access
Meeting mobility demands of 4500 students, faculty and staff at a university is no small task. Join this Webcast to hear the Director of Enterprise Infrastructure explain the steps Abilene Christian University took to deliver a new level of student-faculty interaction. Learn More

Windows XP flaws help Russian 'Qbot' gang build 500,000 PC botnet
But are botnets becoming yesterday's worry? Read More

New products of the week 10.06.14
Our roundup of intriguing new products from companies such as IBM and HP Read More

Computer lighting startup Antumbra delivers "surround sound for your eyes"
A startup called Antumbra run by 5 college students is looking to throw a little soothing light on this situation: People who hunker down in front of their computers until the wee hours, until it feels like their eyes might fall out. Read More


WEBCAST: Viewfinity

Security & Local Administrator Privileges
Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface and stop hackers from using administrative privileges as a back door to stealing credentials for pass-the-hash invasions. Learn More

Judges spar with attorneys on national security data requests
A federal appeals court will rule on the constitutionality of National Security Letters Read More

Jitters over US surveillance could break the Internet, tech leaders warn
Loss of trust in Internet companies could lead to protectionism and a splintered Internet, they say Read More

Almost half of Android devices still have a vulnerable browser installed
The percentage is much higher in some countries and lower in the U.S, security firm Lookout estimates Read More


WHITE PAPER: Dell | Symantec

Strategies for Gaining Control and Securing Mobility
We are in the midst of a mobile revolution. Numbers of mobile devices are growing with some experts predicting that employees will be carrying three or more devices. Growth is not limited to just devices. As the number of enterprise apps rapidly expands, "an app for everything" is a slogan few would question. Learn More

Four-digit passcodes remain a weak point in iOS 8 data encryption
Longer passwords would be more resistant to brute-force attacks Read More

McAfee, think tank push online voting, but recognize security risks
A new paper calls for a push to solve security problems related to Internet voting Read More

Symantec reportedly in talks to split into storage and security units
The reported plans are in line with similar strategies announced by Hewlett-Packard and eBay Read More

McAfee's most dangerous cyber celebrities of 2014
Musicians dominate the 2014 list of celebs you might not want to search on for fear of malware Read More


SLIDESHOWS

9 useful add-ons for Google Docs

Here are nine that we found to be really useful and easy to use when you're writing, editing and sharing documents.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Guess how many U.S. lawmakers have a Windows Phone?

2. Gartner: Top 10 Technology Trends for 2015 IT can't ignore

3. Computer lighting startup Antumbra delivers "surround sound for your eyes"

4. Gartner: IT careers – what's hot?

5. Why did Microsoft skip Windows 9 and jump to Windows 10?

6. Microsoft and the Windows Phone

7. Computer engineering degrees pay off big time

8. 'Unlawful' WiFi hotspot blocking ruling highlights academic IT headaches

9. After iOS 8's glitches, Apple might want to rethink its update strategy

10. Top 10 Windows 10 Technical Preview feedback requests after 1 week


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment