Search This Blog

Friday, January 31, 2014

Feds grab 163 web sites, snatch $21.6 million in NFL counterfeit gear strike

iOS vs. Android: Which is more secure? | No Cybersecurity Love from President Obama

Network World Security

Forward this to a Friend >>>


Feds grab 163 web sites, snatch $21.6 million in NFL counterfeit gear strike
As they have for the past few years the US Customs department teamed with the National Football League to cut into the lucrative counterfeit sports gear market. In what the feds called "Operation Team Player," special agents from U.S. Immigration and Customs Enforcement (ICE) and officers from Customs and Border Protection worked with the National Football League (NFL) and other sports leagues along with law enforcement agencies to identify illegal shipments imported into the U.S., as well as stores and vendors selling counterfeit trademarked items. Read More


WHITE PAPER: IBM

Smarter analytics on IBM POWER7 for Retail
The retail landscape is changing—industry leaders are enhancing their interactions with customers through insights gained from all channels. Read the white paper and see how IBM POWER7 smarter analytics can gather and analyze shopper information to personalize retail experiences, drive more sales, gain loyalty and improve supplier collaboration. Learn More

WEBCAST: Dell Inc.

Make the Challenges of Remote Office IT a Thing of the Past
Join us to see why PC Pro named Dell PowerEdge VRTX the "2013 Server of the Year." PowerEdge VRTX may be just what you need in your remote and branch offices to redefine your IT operations. Take advantage of the onboard shared storage, then scale over time as needed. Learn more

iOS vs. Android: Which is more secure?
With millions of new iOS and Android devices pouring into the enterprise every quarter, it's important to know just how much risk these devices bring -- and if one mobile operating system has an edge over another when it comes to securing enterprise applications and data. Read More

No Cybersecurity Love from President Obama
I started my high tech career in 1987, when I arrived at EMC fresh out of business school. The CEO at that time was Richard Egan, the "E" in EMC. At each quarterly meeting, Mr. Egan would get up in front of the entire company, review the quarterly objectives he had set forth for the company at the previous meeting, and grade the company on its ability to meet stated goals. This review kept the... Read More


WEBCAST: IBM

IBM Intelligent Investigation Manager: Online Product Demo
Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more efficient and effective investigations. Learn More.

The top 5 security threats to watch for in 2014
The year's barely started, and we've already had enough data breaches at major retailers to make a barter economy seem like a good idea. Unfortunately there are yet more security threats to look forward to in 2014. Here are the biggest ones we anticipate. Read More

Criminals use Java to infect Linux and Mac users with DDoS bot
Criminals are once again using Java's cross-platform design to add Linux and Mac users to their usual Windows target list, Kaspersky Lab's researchers have discovered. Read More


WHITE PAPER: Crittercism

Getting Agnostic about Mobile Devices
The need for flawless, high-performing mobile apps is critical, yet many organizations struggle. This paper explains how to accurately analyze performance of mobile apps, calculate the cost of app failure, and how to develop, deploy and test mobile apps so that malfunctions don't happen. Read more!

Cloud availability trumps security concerns when it comes to Shadow IT
As pressure mounts to deliver value with ever-increasing speed, lines of business (LOB) are often drawn to cloud computing's ease of use, flexibility and rapid time-to-value. The resultant Shadow IT created by use of consumer grade cloud computing resources usually raises questions about enterprise security, but the real risk is the potential for downtime due to inadequate availability. Read More

Best practices for network security management
With visibility on both the network and device level, tremendous amounts of data are translated into intelligence that deciphers complicated network security transactions into manageable, actionable information. Read More

GoDaddy owns up to role in Twitter account hijacking incident
GoDaddy has acknowledged that one of its employees fell victim to a social engineering attack allowing a hacker to take over a customer's domain names and eventually extort a coveted Twitter user name from him. PayPal, which the victim claimed also played a role in the attack, denied the accusations. Read More

Pharmaceutical IT chief melds five cloud security companies to bolt down resource access
Having migrated his company from on-site servers and applications to a cloud-based software-as-a-service, Nathan McBride, vice president of information technology at AMAG Pharmaceuticals, is now working to influence security by getting five cloud security service providers to build what he wants. Read More


SLIDESHOWS

FIRST LOOK: New Cisco Nexus switches

Cisco extends its Nexus data center switching line.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Old-school Wi-Fi is slowing down networks, Cisco says

2. 10 apps you'll need to survive Super Bowl Sunday

3. Cisco's SDN defense takes a hit

4. Facebook eyes 'cold flash' to store those old baby pictures

5. Wikipedia dodges critical vulnerability that could have let attackers take over

6. 13 Job Search Apps That Will Help You Get Hired

7. Tech Salary Guide for 2014

8. With Motorola sale to Lenovo, Google is unloading a headache

9. Revenge is a dish best served electronically: 12 cautionary tales

10. Troll sues movie distributors for distributing movies via cell


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: