Wednesday, April 6, 2016

Feds lack managed response to large-scale cyber attack

Trump Hotels investigating possible payment card breach

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Apr 06, 2016
Featured Image

Feds lack managed response to large-scale cyber attack

The Departments of Defense and Homeland security are unclear about who would take charge and work with civilian authorities during a large-scale cyber attack on the US. There are a number of plans and directions for how the government would respond to a cyber attack on the nation's electric grid or other large entity but tons of clarification and specific directions need to be ironed out to respond effectively, according to a Government Accountability Office report out this week. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Trump Hotels investigating possible payment card breach
Light will ultimately secure the Internet, scientists say
IRS: Top 10 2015 identity theft busts
Consumers don't think they'll get hacked
What's the deal with the massive Panama Papers data leak?
This startup uses math to show whether your network is safe
Veriflow promises to bulletproof networks
UL takes on cybersecurity testing and certification
Three-year-old IBM patch for critical Java flaw is broken

White Paper: Veritas

NetBackup 7.7 : Transform Backup to Transform your Business

Long recognized as the market leader of enterprise backup and recovery software, Veritas NetBackup is built to protect the largest and most demanding data center environments. Read More

Thumbnail Image

Trump Hotels investigating possible payment card breach

The Trump Hotel Collection said on Monday it is working with the Secret Service and FBI to investigate a payment card breach, its second one in less than a year. Read More

Thumbnail Image

Light will ultimately secure the Internet, scientists say

Absolute secure information will eventually be made available through a revolutionary light-based password exchange now that a technical limitation has been removed, say researchers. Read More

Thumbnail Image

IRS: Top 10 2015 identity theft busts

The IRS faces an uphill battle in combatting identity theft, but that doesn't mean it isn't trying. In fiscal year 2015, the IRS said it started 776 identity theft related investigations, which resulted in 774 sentencings through its Criminal Investigation enforcement efforts. The courts continue to impose significant jail time with the average penalty in 2015 at 38 months in jail— the longest sentencing being over 27 years. Read More

Thumbnail Image

Consumers don't think they'll get hacked

Multiple surveys find that when it comes to online consumer security and privacy, there is a disconnect: Users say they care about it, but most of them don't make any effort to do much about it. Some experts say government and industry should do it for them. Read More

Thumbnail Image

What's the deal with the massive Panama Papers data leak?

A data breach at Panamanian law firm Mossack Fonseca is being touted as the largest ever, at least in terms of the sheer volume of information leaked. Read More

Thumbnail Image

This startup uses math to show whether your network is safe

How do you know your network is safe from attacks and failures? Veriflow, a startup with backing from the U.S. Defense Department, says it can make sure. Read More

Thumbnail Image

Veriflow promises to bulletproof networks

Eliminating both outages and breaches is the Holy Grail for network professionals. Can Veriflow deliver? Read More

Thumbnail Image

UL takes on cybersecurity testing and certification

Underwriters Laboratories' new Cybersecurity Assurance Program uses a new set of standards to test network-connected products for software flaws. Read More

Thumbnail Image

Three-year-old IBM patch for critical Java flaw is broken

Security researchers have found that a patch released by IBM three years ago for a critical vulnerability in its own Java implementation is ineffective and can be easily bypassed to exploit the flaw again. Read More

White Paper: Hewlett Packard Enterprise

The Data Protection Playbook for All-Flash Storage

Learn why an end-to-end flash strategy integrated with a solid data protection solution is a critical step when migrating to the All-Flash Datacenter. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

9 new features in Windows 10

Terrible computer pranks that could get you fired Read More

Most-Read Stories

1. Hewlett Packard Enterprise just released its new logo, and it's really boring
2. HTTP compression continues to put encrypted communications at risk
3. Raspberry Pi + Google Coder = HTML + CSS + JS + node.js = way cool
4. Brocade buying Ruckus Wireless for $1.2 billion
5. Massachusetts AG sues ITT Tech for allegedly exploiting computer network students
6. The Microsoft Surface I really want
7. Most powerful Internet of Things companies
8. Microsoft is preparing a premium version of Outlook.com
9. REVIEW: Linux Mint 17.3 delivers better interface plus long-term support
10. 19 free cloud storage options
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive