Search This Blog

Tuesday, February 25, 2014

DARPA wants to scrub scourge of counterfeit computer gear

How to Test the Security Savvy of Your Staff | 6 lessons learned about the scariest security threats

Network World Security

Forward this to a Friend >>>


DARPA wants to scrub scourge of counterfeit computer gear
Few things can mess up a highly technical system and threaten lives like a counterfeit electronic component, yet the use of such bogus gear is said to be widespread. A new Defense Advanced Research Projects Agency (DARPA) program will target these phony products and develop a tool to "verify, without disrupting or harming the system, the trustworthiness of a protected electronic component." Read More


WHITE PAPER: IBM

Streamline Data Protection with Storage Manager
IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup and Restore, TSM is a far more comprehensive data-protection solution. Read Now

WHITE PAPER: IBM

Pay-as-you-Grow Data Protection
IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions they need, and add new functionalities as they grow. Read Now

How to Test the Security Savvy of Your Staff
How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions. Read More

6 lessons learned about the scariest security threats
Advanced persistent threats have garnered a lot of attention of late, deservedly so. APTs are arguably the most dangerous security concern for business organizations today, given their targeted nature. Read More

Poorly managed SSH keys pose serious risks for most companies
Many companies are dangerously exposed to threats because they don't properly manage the Secure Shell cryptographic keys used to authenticate access to critical internal systems and services. Read More


WHITE PAPER: Dell Software

A New Set Of Network Security Challenges
IT faces conflicting mandates from the business. On one hand, employees demand access from devices beyond the firewall such as smartphones, tablets, home PCs and laptops. On the other hand, risk management dictates corporate data must remain protected. The overarching challenge: balance productivity and security. A Must Read!

Blackphone plans more secure devices, bouyed by Snowden leaks
Blackphone, the Swiss start-up that's launching a smartphone with encrypted communications, is planning a series of devices around the same idea, one of the company's co-founders said on Monday. Read More

Hacker defaces website of IT security certification body EC-Council
A hacker defaced the website of EC-Council, an organization that runs IT security training and certification programs, and claims to have obtained copies of passports of law enforcement and military officials who signed up for the organization's courses. Read More

Apple encryption mistake puts many desktop applications at risk
A subtle mistake in how Apple implemented a basic encryption feature that shields data from snooping also affects many desktop applications that rely on the code, according to a noted security researcher. Read More


WHITE PAPER: Dell Software

Quantifying the Impact of Network Based Attacks
This document will give you some guidelines on how to assess the impact of network-based attacks on your organization. We will look at: • Different types of network-based attacks • How those attacks can affect your bottom line • Methods of quantifying the impact of those attacks Learn more!

IT pros rank University of Texas San Antonio best school for cybersecurity
The University of Texas at San Antonio (UTSA) tops a somewhat unexpected list of schools that are considered by security practitioners as the best in the country for cybersecurity courses and degree programs. Read More

How IT Can Establish Better Cloud Control
There's no getting around it: Employees who use SaaS applications are more irresponsible about password security, file transfer and IT compliance. But IT's failure to communicate about risky behavior and provide tools to help employees do their work is part of the problem. Here are steps you can take to bring SaaS back under control. Read More

Bitcoins, other digital currencies stolen in massive 'Pony' botnet attack
Cybercriminals have infected the computers of digital currency holders, using a virus known as "Pony" to make off with account credentials, bitcoins and other digital currencies in one of the largest attacks on the technology, security services firm Trustwave said. Read More


SLIDESHOWS

Free tools for Windows Server admins

There are endless software tools and utilities out there to help you in managing your network. Here are some of the best free ones.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Microsoft Lync gathers data just like NSA vacuums up info in its domestic surveillance program

2. Free tools for Windows Server admins

3. Juniper unveils new operating plan to accelerate growth

4. Juniper broadens SDN for carriers

5. Major SSL flaw found in iOS, OS X

6. Users mock Microsoft for asking their help on XP-to-Windows 8.1 upgrades

7. Whatever happened to the IPv4 address crisis?

8. Beware of employees' cheap Android phones

9. Products to watch for at Mobile World Congress 2014

10. One tweak can make your Windows PC virtually invulnerable


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: