Friday, July 19, 2013

12 of the worst data breaches of 2013 so far

  California Attorney General releases breach report | Could Government Integrators Take Their Big Data Security Analytics Skills to the Commercial Market?
 
  Network World Compliance

Forward this to a Friend >>>


12 of the worst data breaches of 2013 so far
Read More


WHITE PAPER: F5

The Shortfall of Network Load Balancing
Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access. Read this paper to learn why applications fail, why network load balancing alone offers little protection, and why context-aware application delivery is so critical. Learn more

WHITE PAPER: Netscout Systems Inc.

Good APM Practices Get Results
According to NetForecast's survey, enterprises with application performance management (APM) best practices benchmark scores above six on a ten-point scale experience 75% better results in critical areas. This research paper reveals the survey results as well as discusses the best practices for APM. Learn More.

California Attorney General releases breach report
In the first report of its kind, California's Attorney General, Kamala D. Harris, had revealed that 2.5 million people -- roughly 6.5 percent of the state's population -- were exposed by data breaches in 2012. Read More

Could Government Integrators Take Their Big Data Security Analytics Skills to the Commercial Market?
After the terrorist attacks of 9/11, intelligence agencies and law enforcement organizations in Washington realized they had a problem. Federal agencies had pockets of intelligence spread all over the place and needed to consolidate them into massive data repositories. Additionally, the feds needed help sorting through the noise to find nuggets of true intelligence value. Read More

INSIDER
IT Resume Makeover: Making the Military-to-Civilian Transition
Making the move from the military to a corporate IT leadership role can be difficult. Don't make it harder on yourself by showcasing the wrong skills. Read More


WHITE PAPER: Hitachi and Microsoft

Rapid Deployment of Microsoft Environments
Learn how to get the most out of your Microsoft environments while staying within budget, by looking at Hitachi turnkey converged infrastructure solutions validated by Microsoft from a single qualified vendor. They're pre-validated and preconfigured, they ship quickly and they're ready to deploy right out of the box. Learn more

Open-source tool to ease security researchers' quest for secrecy
To be presented and released at Black Hat, CrowdStrike's Tortilla delivers to researchers much-needed anonymity on Windows machines Read More

Signed Macintosh malware uses Right-to-Left Override
Malware targeting OS X is using a technique called Right-to-Left Override in order to spoof its malicious intent Read More

Facebook fixes critical flaw, cites as example of bounty's success
Bounty programs can buy goodwill with bug hunters with very little downside, said one security expert Read More


WHITE PAPER: Tripwire

So Much Data, So Little Control
It used to be that all you had to do to protect your company's intellectual property and customer information was lock the file drawers and, later, put layers of defenses around the data center. Learn More

Can your IP address give away your identity?
Read More

6 rising open source stars
Names you'll want to know in the free software/open-source world. Read More

Open-Xchange to double development team, speed up feature rollout
Collaboration software vendor Open-Xchange has received a US$20 million investment that it will use to expand its development team to speed up feature rollouts for its Web-based office suite, the company announced on Thursday. Read More

Quick look: Yahoo Chief Marissa Mayer's first year
Acquisitions, culture change have kept Yahoo CEO Mayer busy Read More

Android mega flaw fixed but phones remain vulnerable
Handset makers are slow to push fix to users, and fragmentation is not helping in the enterprise Read More

 

SLIDESHOWS

Can your IP address give away your identity?

Can hackers, stalkers, criminals, and other Internet users track you down by your Internet Protocol (IP) address?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Hacking to rig election earns college student one-year prison sentence

2. Facebook Open Compute project has "weaknesses," Cisco CEO says

3. Citrix edges Microsoft and VMware in VDI face-off

4. Firefox OS for phones is shipping, and it is impressive

5. iPhone 5S specs leaked: NFC, 12-MP camera, and fingerprint authorization sensor expected

6. Cisco building an Internet of Everything router: Chambers

7. Can your IP address give away your identity?

8. Is Microsoft starting from scratch with Windows Phone 9?

9. FBI Ransomware spotted on Mac OS X

10. Yahoo buys Admovate to ramp up its mobile advertising

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: