Search This Blog

Friday, October 26, 2012

Line blurs between insider, outsider attacks

  BYOD resistance loosening but security practices lacking | 9 things enterprise IT will like about Windows 8
 
  Network World Security

Forward this to a Friend >>>


Line blurs between insider, outsider attacks
The insiders strike again. But this time it's not the malicious insider, but insiders' access to corporate data, and it is for sale in the cybercrime underground. Read More


WHITE PAPER: Brocade

Scaling Out Data Centers
Organizations of all sizes are facing daunting challenges as they struggle to adapt their data center networks to new technologies and applications. The move toward cloud architectures in particular is demanding a high-performance network interconnect that can host servers potentially numbering in the thousands. Read Now

WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Live Webcast: Tuesday, October 30th at 12:00pm ET Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

BYOD resistance loosening but security practices lacking
A survey of 650 information and security professionals about how the "bring your own device" (BYOD) trend is impacting their organizations finds one-quarter of them forbid use of personally owned devices such as smartphones and tablets on the network. However, the majority that do often lack meaningful policies or security controls related to these devices. Read More

9 things enterprise IT will like about Windows 8
Read More


WEBCAST: CDW Corporation

Unlocking the Business Value of Videoconferencing
In this Webcast, you will learn how unlocking the potentials of Video Conferencing can empower your teams to work as one cohesive group regardless of location, ensuring that videoconferencing becomes an effective productivity tool in your enterprise. Learn More.

Baddest Botnets of 2012
According to security firm Kindsight, these are the Top Ten Worst Botnets this year. Read More

Gartner: Top 10 strategic technology trends for 2013
If some of the top 10 strategic technology trends going into 2013 look familiar it's because quite a few -- like cloud computing and mobile trends -- have been around for awhile but are now either morphing or changing in ways that will continue to impact IT in the next year. Read More


WEBCAST: Dell SonicWall

Why First Generation Firewalls Aren't Making the Grade
In this exclusive webinar, learn from Dell-SonicWALL's Patrick Sweeney, how today's Next-Generation Firewalls allow businesses to scale their network security to meet the demands of emerging threats and new technology trends, while ensuring performance to meet key business objectives. Resister Now!

'Password' is still the worst password, but watch out for 'ninja'
Although the tech world is always changing, one thing remains the same: A lot of people use terrible passwords. Read More

'Lance Armstrong' bug hunt continues in stable Linux kernel
The discovery of a somewhat alarming bug in the Linux ext4 filesystem provoked a minor wave of panic this week, but project maintainer Theodore Ts'o says it has since become clear that the problem can likely only affect a small number of users. Read More

Barnes & Noble halts use of PIN pad devices after data breach
Barnes & Noble has removed PIN pad devices from all of its nearly 700 stores nationwide as a precaution after detecting evidence of tampering with the devices at 63 of its stores in eight states. Read More

Windows XP turns 11, still not dead yet
On the same day Microsoft loudly proclaims Windows 8 in New York, the aging-but-still-going Windows XP today quietly celebrated its 11th birthday. Read More

 
 
 

SLIDESHOWS

Top 10 tech gadgets of 2012
Here are 10 that made a significant impact in the industry this year.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Google Maps puts well-funded startup in the poorhouse
  2. Does OpenStack need a Linus Torvalds?
  3. DDoS attacks against banks raise a question: Is this cyberwar?
  4. 9 things enterprise IT will like about Windows 8
  5. The new iPads: What you need to know
  6. VMware, the bell tolls for thee, and Microsoft is ringing it
  7. Country's largest 4-year university expels Cisco, saves $100 million
  8. .xxx to launch porn search engine
  9. Gartner: 10 critical IT trends for the next five years
  10. Sycamore Networks headed to tech industry graveyard
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: