Search This Blog

Thursday, August 30, 2012

Oft-cited cybercrime cost estimates hosed down

  Rise of the AI Overlord: Machines monitor, automatically detect suspicious behavior | Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more
 
  Network World Security

Forward this to a Friend >>>


Oft-cited cybercrime cost estimates hosed down
There is general agreement that the worldwide cost of cybercrime is in the hundreds of billions. But just how many hundreds of billions is a matter of debate, following a ProPublica report that questioned the most widely quoted estimates by two major security vendors. Read More


WHITE PAPER: Dell

Management Madness: How to Manage Mobile Devices
There are six major mobile operating systems in use now and each one offers its own set of security and management challenges. The resources in this Mobility KnowledgeVault will help you keep these devices secure on the corporate network with expert tips on management tools, endpoint security software, increasing application support and more. Learn More

WHITE PAPER: Webroot Software

Try the fastest business security ever.
Online security is an increasing risk for businesses, but what is the best solution? Cloud-based SaaS security is an emerging trend for organizations looking to address today's security reality. Learn about the cloud-based SaaS security. Learn More.

Rise of the AI Overlord: Machines monitor, automatically detect suspicious behavior
When it comes to monitoring CCTV video feeds for suspicious activity, the human brain reportedly overlooks 45% of all activity after 12 minutes. After 22 minutes, the human brain overlooks 95% of all activity. But what if all the 45 - 60 million eye-in-the-sky cameras were connected to computers with artificial intelligence . . . computers with an extraordinary AI brain that can see, learn, get smarter... Read More

Tech CEOs' first jobs: Licorice maker, housekeeper, scuba diver and more
Before their corporate jobs, many tech CEOs got their hands dirty, scrubbing oils stains off asphalt, cleaning bathrooms, and shoveling monkey cages. Here are their stories. Read More


WHITE PAPER: F5

Three Phases to Improve Application Delivery Teams
Most organizations struggling with application performance have not developed the processes and organization that can maximize the benefits of their application delivery solutions. In this report, Gartner outlines three phases to help IT organizations improve their structure to deliver better application performance. Learn More!

Second Java zero-day found: Time to disable it, say experts
Companies that want to avoid becoming victims of the latest zero-day Java vulnerability are being advised to disable the software platform's browser plugin until a patch is available. Read More

FBI nabs alleged LulzSec member over Sony Pictures hack
A 20-year-old man surrendered to FBI agents on Tuesday for his alleged hacking of Sony Pictures, one of a wave of attacks executed last year by the hacking collective LulzSec. Read More


WHITE PAPER: IBM

IBM InfoSphere: Solutions for Insurance
By creating a single, 360-degree view of the customer with IBM InfoSphere Master Data Management, insurance companies can gain a deeper understanding of customer needs, develop targeted marketing campaigns, adapt to consumer trends and enhance the efficiency of operations. Learn More.

18 great IT tools for Android
These Android apps, from network sniffers to SNMP MIB browsers to SSH tools, will come in handy for network and IT pros Read More

How cybercriminals and hacktivists use DDoS tools to attach
Network professionals know that distributed denial-of-service attacks are an ever-growing danger. The recent assault on Twitter is just the latest evidence. Using a mushrooming array of advanced tools, including pay-per-use services and mobile devices, attackers are taking down websites, DNS and email servers, often using these tools to destroy a company's online revenue, customer service and brand reputation. But the technology is only half the story. The thinking that shapes attacks — an evolving blend of careful planning, probing and improvisation—is often the difference between duds and strikes that leave victims begging for mercy. Read More

Chinese cybersquatters fuel rise in domain disputes
Legal conflicts over the ownership of Internet domains could hit a record this year with Chinese cybersquatters a major factor behind the spike, legal information firm Sweet & Maxwell has reported. Read More

 
 
 

SLIDESHOWS

Hot Products at VMworld 2012
Click through all the products being released at VMworld in San Francisco this week.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Six ways to protect against the new actively exploited Java vulnerability
  2. Cisco, VMware doing just fine, thank you
  3. Massive leak project Hellfire hackers dump 1 million accounts from 100 sites
  4. VMware declares death to vRAM pricing
  5. The best new ultrabooks
  6. 5 reasons Android users will switch to the iPhone 5
  7. 5 reasons Android users won't switch to the iPhone 5
  8. Police fire on suspected iPhone thief, lock down school during chase
  9. vCloud vs. vSphere: VMware explains security changes
  10. Netflix factor has university networks creaking under streaming video strain
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: