High-tech

High-tech
Light

Wednesday, May 15, 2013

View from inside Verizon's security SWAT team

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: May 14, 2013 9:00 PM
Subject: View from inside Verizon's security SWAT team
To: <aquarianm@gmail.com>
Cc:

  Nick Carr's 'IT Doesn't Matter' still matters | Microsoft patches Pwn2Own & IE8 'nuke' critical holes
 
  Network World After Dark

Forward this to a Friend >>>


View from inside Verizon's security SWAT team
Bryan Sartin is director of Verizon's RISK Team, the communications provider's computer forensics practice, which is also the group that helps create the annual Data Breach Investigations Report (DBIR). Network World Editor in Chief John Dix caught up with Sartin to learn more about the RISK Team, get his take on the state of enterprise security, and discuss new findings from the recently published DBIR report.
 Read More


WHITE PAPER: SiSense Ltd.

Choosing the Right Tech for Your Business Analytics Project
The size, speed and scalability of different business analytics technologies vary greatly. The advantages and disadvantages of RDBMS, In-Memory and In-Chip technologies are detailed in this report. Read Now!

WEBCAST: LogiAnalytics (formerly LogiXML)

Webinar: Create Competitive Advantage, Featuring Synchology
You are invited to our live, interactive webinar featuring the President and Product Director of Synchology: The Branded Payments Company. Synchology was using SAS and Excel to create performance reports for their clients, which was time-consuming and had numerous technical limitations. View Now!

Nick Carr's 'IT Doesn't Matter' still matters
Nick Carr's article "IT Doesn't Matter" was published in in Harvard Business Review in May 2003 and ignited an industry firestorm for its perceived dismissal of the strategic value of IT. Read More

Microsoft patches Pwn2Own & IE8 'nuke' critical holes
Ladies and gentlemen, start your engines, but be ready to reboot as Microsoft released 10 security bulletins to patch 33 vulnerabilities that are listed as critical or important. Read More

Melinda Gates tells Duke grads: It's all about your real connections
Transcript of technologist/philanthropist Melinda Gates' commencement address to Duke University graduates. Read More

Western Union, eh, phisher person?
The ever-vigilant IT department here at Network World just issued a warning to be on the lookout for phishing email purporting to be from Western Union. Western Union? What? I'm going to fall for the old "You've got a telegram" ruse? (The email was indeed in my inbox.) I kid, of course, because we all remember that Western Union transacted its final telegram back in 2006. From an Associated Press... Read More

FBI/IC3: Impersonation, intimidation and scams, yep that's the Internet
The FBI and Internet Crime Complaint Center (IC3) issued their annual look at the state of the dark side of the Internet which is indeed thriving with all manner of scams and intimation tactics being used by criminals. [RELATED: An inside look at the fraud blight] Read More

The 10 most important milestones in Web browser history
Read More

History of flexible displays
Read More

McAfee rethinks consumer security service delivery
McAfee, part of Intel, today announced a profound shift in how it distributes and prices its consumer security products by introducing LiveSafe, a service that combines anti-malware plus a score of other capabilities, such as anti-theft protection and a so-called "safety deposit box" in the cloud that can only be accessed by means of the user's face or voice biometric. Read More

INSIDER
7 steps to securing Java
Java, the popular OS-independent platform and programming language, runs on just about every kind of electronic device imaginable, including computers, cell phones, printers, TVs, DVDs, home security systems, automated teller machines, navigation systems, games and medical devices. Read More

 
 
 

SLIDESHOWS

Sun's stars: Where are they now?

One of the brightest lights in Silicon Valley for more than two decades.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Verizon Enterprise chief: We're headed for cloud computing's A-list

2. Comedian Rob Schneider stars as Google Docs in Microsoft Office 365 video

3. New York calls on phone makers to help deter theft

10. 100G, SDN leaving older switches behind

9. iTunes: Still slowing down Windows PCs after all these years

6. Understanding Software Defined Networking

5. iPhone rumor rollup for the week ending May 10

4. 12 iPhone apps that will make you a networking star

7. Networks in 2020: More traffic, less energy

8. McAfee rethinks consumer security service delivery

 

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment