Tuesday, February 23, 2016

Hacking operations are as vulnerable as a house of cards

Are we in artificial intelligence winter?

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Feb 23, 2016
Featured Image

Hacking operations are as vulnerable as a house of cards

Last month I met with the security team at a major bank to discuss their detection capabilities. The head of the bank's security operation center claimed that his organization's security stack could detect certain threats but he was worried about them missing other attack vectors. His methods were all wrong. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Are we in artificial intelligence winter?
Attackers hack Linux Mint website to add ISO with backdoor
What keeps white hat hackers from turning to the dark side?
Proper device management could have prevented the whole FBI-Apple fight
Anticipating the RSA Security Conference
What users love (and hate) about 4 leading identity management tools
MWC: Wi-Fi hack test shows 'reckless' behavior; MasterCard to expand 'Selfie Pay'
Create a data recovery plan and secure your network
Startup touts four-factor authentication for VIP-level access

White Paper: Kony Inc

Kony Mobility Challenges

This paper examines the most recent research on companies' top mobile priorities and challenges. Read More

Thumbnail Image

Are we in artificial intelligence winter?

"Artificial intelligence, defined here as computer simulation of cognitive processes such as perception, recognition, reasoning, and control, have captured the public's imagination for over 60 years. However, artificial intelligence research has proceeded in fits and starts over much of that time, as the field repeats a boom/bust cycle characterized by promising bursts of progress followed by inflated expectations and finally disillusionment, leading to what has become known as an "AI winter" – a long period of diminished research and funding activity," IARPA wrote. Read More

Thumbnail Image

Attackers hack Linux Mint website to add ISO with backdoor

Linux Mint warned its website was hacked via WordPress and attackers changed an ISO link to a malicious Linux Mint 17.3 Cinnamon edition on Saturday. The database was sold on the dark web and hackers re-compromised the site after it was first "cleaned." Read More

Thumbnail Image

What keeps white hat hackers from turning to the dark side?

Security expert David Holmes asked three dozen white hat hackers to get a sense of what kept them on the side of the good guys. Read More

Thumbnail Image

Proper device management could have prevented the whole FBI-Apple fight

Even without a comprehensive policy, just enrolling the device in an MDM system would have been enough. Read More

Anticipating the RSA Security Conference

Skills shortage, security automation, cloud security, data security, endpoint security and security analytics top my list of priorities Read More

Thumbnail Image
INSIDER

What users love (and hate) about 4 leading identity management tools

What do enterprise users really think about Oracle Identity Manager, CA Identity Manager, IBM Tivoli Identity Manager, and SailPoint IdentityIQ? There's a lot to like, but also plenty of room for improvement. Read More

Thumbnail Image

MWC: Wi-Fi hack test shows 'reckless' behavior; MasterCard to expand 'Selfie Pay'

After a Wi-Fi hack experiment, Avast called Mobile World Congress attendees' behavior 'reckless;' MasterCard announced plans to expand its pay-by-selfie program. Read More

Thumbnail Image

Create a data recovery plan and secure your network

Following the steps behind the Center for Internet Security and their best practices. Read More

Thumbnail Image

Startup touts four-factor authentication for VIP-level access

Trusona's system involves an app, a dongle, the post office and the subject of 'Catch Me If You Can". Read More

Deep Dive: Symantec

Web Browser Security: Staying Secure on the Internet

Your choice of a Web browser is the single most important factor in making those sessions secure. Which browser should you use? And why? Let this Deep Dive be your guide. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

7 rumored Apple products we can expect to see in 2016

Coolest and most unusual NYC Toy Fair 2016 techie playthings Read More

Most-Read Stories

1. iPhone 7 Rumor Rollup: Interference-free & waterproof; dazzling new concept designs
2. Opera founder talks up new Vivaldi browser
3. 19 free cloud storage options
4. Good riddance payphones: NYC's free gigabit Wi-Fi kiosks go live
5. Man rescued by Disney cruise ship charged with hacking Boston Children's Hospital
6. Skullcandy unplugs MPLS, moves to WAN-as-a-Service
7. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
8. Cisco announces new 'Digital Ceiling' IoT solution
9. Reviewing the Lenovo 11e: A sub-$300 Thinkpad with great Linux support
10. Apple CEO Cook: Judge's order to decrypt shooter's iPhone is more than an encryption issue
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive