Tuesday, August 23, 2016

Why a security team embraces shadow IT

NSA zero days and encryption backdoors need clear disclosure policies

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Aug 23, 2016
Featured Image

Why a security team embraces shadow IT

A group within Western Union information security team relies on cloud software, including content management, social collaboration and single sign-on tools to let employees to get their work done while protecting corporate data. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

NSA zero days and encryption backdoors need clear disclosure policies
Americans want passwords, not biometrics, survey finds
Sage data breach highlights the risk of the insider threat
US senators want airline IT meltdowns to end
A new algorithm can hide messages in your favorite dance music
Prize competitions for tough IT, high-tech problems all the rage
Much ado about the ransomware scourge
Cisco uncovers security threat in industrial control system

Video/Webcast: 1E

Automate BIOS to UEFI for Secure Windows 10

In this webinar, 1E Technology Architect Mike Terrill and TrueSec Senior consultant Mikael Nystrom discuss expert tips on migrating to Windows 10 in the most secure way. This can be done using 1E's unique technology to automate the switch from BIOS to UEFI. Read More

Thumbnail Image

NSA zero days and encryption backdoors need clear disclosure policies

Disclosure of NSA zero days signals a need for clear policies on when to notify affected vendors. Read More

Thumbnail Image

Americans want passwords, not biometrics, survey finds

Fear of leaky organizations storing personal biometric data might be behind the public's preference for passwords over biometry for security. Read More

Thumbnail Image

Sage data breach highlights the risk of the insider threat

A suspect in the recent data breach at Sage, a U.K. provider of business software, has been arrested. On Wednesday, police in London detained a company employee. Read More

Thumbnail Image

US senators want airline IT meltdowns to end

Two high-profile airline technology meltdowns stranding thousands of travelers in the past couple weeks have prompted two US senators to push carriers to bolster their technology. Senators Richard Blumenthal (D-Conn.) and Edward J. Markey (D-Mass.)this week sent a letter to the most recent offenders -- Delta and Southwest -- as well as 11 other airlines to get a better handle on whether or not their information technology systems are reliable and resilient. Read More

Thumbnail Image

A new algorithm can hide messages in your favorite dance music

It's long been known that secret messages can be included in music through techniques such as backmasking, but now a Polish researcher has developed an entirely new approach. Read More

Thumbnail Image

Prize competitions for tough IT, high-tech problems all the rage

It has been over six years that the government set the America Competes Act which in combination with Challenge.gov has prompted more than 700 public-sector prize competitions that have doled out more than $80 million in prizes. Read More

Thumbnail Image

Much ado about the ransomware scourge

"With alarming frequency, ransomware hackers are sneaking into consumer and business computers, encrypting files containing photos, documents and other important data, and then demanding a ransom in exchange for the key needed to decrypt the files. Consumers, businesses, and government agencies are falling prey to these schemes, including hospitals whose servers may contain sensitive patient data. Read More

Cisco uncovers security threat in industrial control system

Cisco's security intelligence and research group Talos, said that it had reported a serious vulnerability in Rockwell Automation's industrial control system – the MicroLogix 1400 programmable logic controller (PLC). The Simple Network Management Protocol exploit could let an attacker take complete remote control of the MicroLogix system and modify the device firmware, letting an invader run his own malicious code on the device. Read More

White Paper: 1E

Windows 10 Security: Understanding & Deploying Device Guard

This exclusive 1E White Paper will give you a detailed answer to the following questions
-What is Device Guard designed to achieve?
-What does Device Guard do and how does it do it?
-What are the risks of not using Device Guard?
-How should you implement Device Guard? Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

25 surprising facts about Facebook

Back to school stuff for the discerning techie (or techie-in-training) Read More

Most-Read Stories

1. 19 free cloud storage options
2. Gartner: Colin Powell says he used insecure email during State Department tenure; Oh and we should vote out Congress
3. Peeping into 73,000 unsecured security cameras thanks to default passwords
4. 7 free tools every network needs
5. 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
6. Microsoft acknowledges Anniversary Update causes freezing
7. The CIA, NSA and Pokémon Go
8. IoT is now growing faster than smartphones
9. Cisco to jettison 5,500 jobs, will reinvest in cloud, IoT & more
10. 7 cool internet of things companies to watch
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive