Friday, September 23, 2016

Federal cyber incidents grew an astounding 1,300% between 2006 and 2015

Keeping up with incident response

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Sep 23, 2016
Featured Image

Federal cyber incidents grew an astounding 1,300% between 2006 and 2015

"Federal information systems and networks are inherently at risk. They are highly complex and dynamic, technologically diverse, and often geographically dispersed. This complexity increases the difficulty in identifying, managing, and protecting the myriad of operating systems, applications, and devices comprising the systems and networks. Compounding the risk, systems used by federal agencies are often riddled with security vulnerabilities—both known and unknown. For example, the national vulnerability database maintained by the Mitre Corporation has identified 78,907 publicly known cybersecurity vulnerabilities and exposures as of September 15, 2016, with more being added each day," the GAO wrote. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Keeping up with incident response
Lockdown! Harden Windows 10 for maximum security
IoT security: Intel EPID simplifies authentication of IoT devices
Homeland Security issues call to action on IoT security
Investigating Cybersecurity Incidents — a free course
Yahoo data breach affects at least 500 million users
Cisco Talos: Spam at levels not seen since 2010

Research/Infographic: Citrix Systems

2016 Gartner Magic Quadrant for Enterprise Mobility Management Suites

The enterprise mobility landscape is changing and you need a solution that has you covered no matter what the future brings. Read the report to find out why Citrix has been named a leader. Read More

Keeping up with incident response

Enterprise organizations are forced to ignore security alerts, live with excess risk, and deal with data breaches reactively when they happen. Read More

Thumbnail Image

Lockdown! Harden Windows 10 for maximum security

To make the most of Windows 10's security improvements, you must target the right edition and hardware for your needs Read More

Thumbnail Image

IoT security: Intel EPID simplifies authentication of IoT devices

Intel's proof of concept based on its Enhanced Privacy ID (EPID) streamlines the authentication and installation of IoT devices. Read More

Thumbnail Image

Homeland Security issues call to action on IoT security

U.S. Department of Homeland Security's Robert Silvers says his purpose in speaking at the Security of Things Forum in Cambridge on Thursday wasn't to scare anyone, but then he went ahead and called on everyone in the room to "accelerate everything you're doing" to secure the internet of things. Read More

Thumbnail Image
INSIDER

Investigating Cybersecurity Incidents — a free course

Training provider Logical Operations offers a free online course on how to collect, preserve and analyze evidence from cybersecurity incidents — and prepare for the court case. Read More

Thumbnail Image

Yahoo data breach affects at least 500 million users

A massive breach at Yahoo stole account details from at least 500 million users and is being blamed on state-sponsored hackers. Read More

Thumbnail Image

Cisco Talos: Spam at levels not seen since 2010

"Many of the host IPs sending Necurs' spam have been infected for more than two years. To help keep the full scope of the botnet hidden, Necurs will only send spam from a subset of its minions. An infected host might be used for two to three days, and then sometimes not again for two to three weeks. This greatly complicates the job of security personnel who respond to spam attacks, because while they may believe the offending host was subsequently found and cleaned up, the reality is that the miscreants behind Necurs are just biding their time, and suddenly the spam starts all over again. Read More

White Paper: Masergy Communications Inc.

5 Business Requirements for a Software Defined WAN

The corporate WAN is now the focus of considerable attention after years of modest network innovation. This is due in large part to new efforts behind Software Defined Networking (SDN) standards and architectures. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Open source routers deliver low cost, flexibility

25 CIO pay packages revealed Read More

Most-Read Stories

1. Cisco says router bug could be result of 'cosmic radiation' … Seriously?
2. Cisco moves on from Intercloud, will focus on cloud management instead
3. Cisco CEO Robbins: Wait til you see what's in our innovation pipeline
4. 19 free cloud storage options
5. 7 free tools every network needs
6. Five technologies that will change our lives in five years
7. More than 840,000 Cisco devices are vulnerable to NSA-related exploit
8. Can Wi-Fi and LTE-U live together? The tests are ready
9. Start-up sells a stamp-sized Linux server for $5
10. Black Friday 2016 tech ads will be leaking before you know it
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive