Issue highlights 1. 9 Tips for CIOs as Summer Vacations Hit 2. INSIDER Developing a smart approach to SMAC security 3. Apple-IBM deal threatens Android's enterprise push 4. The FBI is both worried and excited about driverless cars 5. Senate passes bill allowing mobile phone owners to unlock devices 6. Microsoft's future under Nadella less about Windows, more about mobile and cloud 7. SSL Blacklist project exposes certificates used by malware 8. There's almost a million fake apps targeting your phone 9. Would Jobs have made IBM deal? Not in '95 |
WHITE PAPER: HP Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. And 60% of small businesses fail within six months of falling victim to a cyber attack. Learn More |
Have trouble leaving the office behind when you go on vacation? Here are nine tips to help give CIOs peace of mind when they (and their staff and fellow employees) head out for summer R&R. READ MORE |
Few security executives at global enterprises—or even at smaller organizations—have not had to deal with issues related to social media, mobile technology, big data/analytics, or cloud computing.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE |
The new Apple-IBM partnership seems sure to help Apple sell more iPads and iPhones to businesses while extending the reach of IBM's big data and analytics software. The deal may also be setting off alarm bells at mobile device management companies large and small. Google is clearly one target of the new Apple-IBM partnership. The deal comes just weeks after Google announced an initiative to help business users adopt Android tablets and smartphones with new mobile device management software, including the ability to separate work and personal data. The business-related features are part of the coming Android update dubbed "L" announced in June.To read this article in full or to leave a comment, please click here READ MORE |
WHITE PAPER: APC by Schneider Electric This paper describes unique management principles and provides a comprehensive, high-level overview of the necessary program elements for operating a mission critical facility efficiently and reliably throughout its life cycle. Learn more! |
In a report recently obtained by The Guardian, the FBI expressed both concern for driverless cars being used as weapons in drive-by shootings or unmanned bombings and excitement about its potential use for surveillance and pursuit of suspects. READ MORE |
The House will still have to pass the Senate bill before it becomes law READ MORE |
Microsoft's future will be less devoted to its Windows operating system as it continues to push into mobile and cloud services, CEO Satya Nadella said, using his keynote speech at the Worldwide Partner Conference to talk about where the company is headed."We are the company and the ecosystem that will build productivity experiences and platforms for the mobile-first, cloud first-world," he said Wednesday at the WPC in Washington, D.C. "We will reinvent productivity for the new generation. We will empower every individual and organization to achieve more. That is our singular mission."Achieving that goal may not always rely on Windows, he said.To read this article in full or to leave a comment, please click here READ MORE |
WHITE PAPER: F5 Networks Firewalls, WAFs, encryption, SSL VPN, and intrusion prevention systems all reduce the performance of web applications, and all exist solely to secure those applications. Learn how you can increase security with a single point of control without introducing more devices between applications and clients and degrading performance. View Now |
Botnet tracking outfit Abuse.ch has launched a project to list SSL (Secure Sockets Layer) certificates used by some malware programs to hide their communications.A large number of Web services have added support for SSL encryption over the past couple of years and the technology has increasingly been adopted by privacy-conscious users, especially following revelations of large scale surveillance and bulk data collection by intelligence agencies.However, it's not just regular Internet users who rely on SSL to protect their communications. Some cybercriminals also use it to encrypt traffic between malware-infected computers and command-and-control servers in an attempt to bypass intrusion prevention and detection systems, the Abuse.ch maintainers said in a blog post to announce the new SSL Blacklist (SSLBL) project.To read this article in full or to leave a comment, please click here READ MORE |
Fake apps dressed up to look like official ones but actually designed to steal user data are increasingly targeting Android phone users, according to a study by Trend Micro.The company looked at the top 50 free apps in Google's Play Store and then searched Google's app store and others to see if fake versions existed. It found fake versions existed for 77 percent of the apps. The fake apps are often made to look like the real ones and have the same functions, but carry a dangerous extra payload."We've been tracking the activity of malicious or high-risk apps for nearly five years," said JD Sherry, vice president of technology and solutions at Trend Micro. "The potential for people to slip things past the gate and appear legitimate is much easier."To read this article in full or to leave a comment, please click here READ MORE |
How might Steve Jobs have viewed the major enterprise partnership announced yesterday by Apple and IBM?No one can say for certain, of course, since the Apple co-founder has been gone going on three years. But Jobs was known to speak ill of Big Blue – here's a Bloomberg collection of quotes – not to mention the photo of him literally giving IBM the finger. Then there's an interview Jobs gave to Robert Cringely in 1995 in which even what seem to be compliments are in fact back-handed jabs.To read this article in full or to leave a comment, please click here READ MORE |
WHITE PAPER: HootSuite Media, Inc. As businesses embrace social media, related security breaches are on the rise. Corporate Twitter hackings. Rogue employees on the company Facebook account. Executives sharing confidential info on their personal accounts. Learn More |
SLIDESHOWS Worst data breaches of 2014…So far We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn MOST-READ STORIES 1. Ubuntu 14.04: Is Canonical taking on too much 2. Microsoft COO tells partners to get with the cloud program now 3. Say goodbye to desktop phones 4. Apple, IBM join to make iOS the default mobile platform 5. Windows Phone 8.1 and its first update could appear this week 6. U.S. malware share rising, Amazon service No.1 in hosting it 7. 10 disturbing attacks at Black Hat USA 2014 8. Microsoft may lay off over 6,000 employees 9. Russian hackers breach CNET, steal one million usernames, passwords and email addresses 10. Microsoft rumored to be buying security firm that publicized Active Directory exploit | |
No comments:
Post a Comment