Search This Blog

Wednesday, April 24, 2013

Chinese cyber-espionage rising, says Verizon annual report

  Boeing technology offers secure, efficient way to tie together business, industrial nets | FAA on travel delays: Get used to it
 
  Network World Security

Forward this to a Friend >>>


Chinese cyber-espionage rising, says Verizon annual report
Cyber-espionage originating from China has become a top source of data breach incidents, according to an annual report from Verizon. The report found Chinese spying and theft of sensitive corporate information, such as intellectual property, accounted for about 20% of the 621 data breach cases last year that Verizon analyzed. Read More


RESOURCE COMPLIMENTS OF: Sophos

Sophos Virus Removal Tool
Find and remove viruses, spyware, rootkits , fake antivirus and more. Scan now.

WHITE PAPER: Aerohive

Wireless LAN: Preferred Enabler of BYOD
Bring Your Own Device (BYOD) and its array of wireless devices is becoming the dominant way workers access corporate networks . And it's forced IT leaders need to reexamine how to best provide secure, reliable and cost-effective wireless network access. Read Now

Boeing technology offers secure, efficient way to tie together business, industrial nets
The Boeing Company is pioneering a way to securely bring together business IT networks with what ordinarily are entirely separate networks for industrial-control systems (ICS) in order to gain efficiencies and benefits in information-sharing in manufacturing. Read More

FAA on travel delays: Get used to it
The term sequestration has certainly become a four-letter word for many across the country - and now you can count business and regular traveling public among those hating its impact. [25 crazy and scary things the TSA has found on travelers] Read More


WEBCAST: Trusteer

Security Requirements vs. Operational Challenges
In this webinar, guest speaker Rick Holland, senior analyst serving Security & Risk Professionals at Forrester Research, Inc., will discuss the security and operational challenges associated with advanced malware protection. Learn More.

The Web Application Threat Landscape Is Getting Worse
ESG just published a new research report titled, Web Application Testing Tools and Services. The report is comprised of data collected in a survey of 200 North American-based security professionals working at enterprise organizations (i.e. more than 1,000 employees). Read More

Botnets target social networks with spam
Life for a phony profile on Twitter may be short, but it isn't deterring spammers from continuing to work their scams on social networkers, says one security researcher. Read More


WHITE PAPER: PhoneFactor

Guide to Evaluating Multi-Factor Authentication Solutions
Whether you're planning to implement two-factor authentication for the first time or are looking to expand or upgrade your current implementation, this whitepaper will help you choose the two-factor solution that is right for your business. Learn More

Twitter hackers take over AP account, false tweet briefly shakes Wall Street
A tweet posted on the Associated Press account Tuesday reporting two explosions at the White House was bogus and is the result of a hack, the news organization said. Read More

Business students to get HP-designed technical course for cloud, mobile, security issues
College business students need to gain a grasp of technical issues related to cloud computing, big data, security and other network issues they're likely to come across in their careers, so HP is now offering its first technical associate certification for them to cover these topics while in college. Read More

10 tips to secure funding for a security program
Ask any cyber security specialist what their biggest challenge is, and you will get a variety of answers -- ranging from strengthening network security, to managing internal threats, to protecting against cyber espionage. But upon further investigation, you may be surprised to learn that the unanimous pick for the biggest challenge cybersecurity professionals face is simply getting the funding necessary to carry out a security program. There are a great deal of resources and technical support available on how to deal with the never-ending list of threats that arise daily; and we have plenty of opportunities to learn and digest security best practices. However, little information or guidance is available to prepare one for the dreaded budget discussion when new or continued funding is necessary to maintain a strong cyber security posture. Read More

 
 
 

SLIDESHOWS

25 weirdest things in the 'Internet of Things'

The Internet is slowly creeping into every part of our lives, so much so that it's becoming easier to look around the house and find objects that can be connected to the Internet.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 25 weirdest things in the 'Internet of Things'

2. Giants: 10 of the biggest pieces of heavyweight hardware

3. 12 Linux nerds you should follow

10. Top SSL VPN tools

9. What's your obsolete tech really worth on eBay?

6. Ahead of their time: 9 technologies that came too soon

5. 13 PC technologies that need to disappear, stat!

4. Products of the week

7. Some Windows XP users just can't afford to upgrade

8. Chinese cyber-espionage rising, says Verizon annual report

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: