Thursday, October 3, 2013

Yahoo abandons T-shirt rewards for vulnerability information

Bitcoin forum goes offline after hack | Yahoo abandons T-shirt rewards for vulnerability information

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


BOOK GIVEAWAY: The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools. Enter now for your chance to win! Read More


RESOURCE COMPLIMENTS OF: Neustar

Hoping DDoS will go away? Wish you had a strategy?
Knowing is half the battle. Learn from experts in: • Government • Industry • Research & analysis Join us for DDoS Awareness Day From Hope to Strategy A live virtual event hosted by Neustar, sponsored by CSO │October 23, 2013 Register to Reserve Your Space Now

WHITE PAPER: Akamai Technologies, Inc.

Develop an Effective DDoS Mitigation Strategy
To lower your organization's exposure to increasing web-based attacks, you need an effective DDoS Mitigation strategy. Download this Forrester Research report to learn how a two-phased approach to protecting your websites and applications can lower your risk. Learn More

Bitcoin forum goes offline after hack
A popular Bitcoin forum, Bitcointalk.org, remained offline Wednesday night as it investigated a cyberattack. Read More

Yahoo abandons T-shirt rewards for vulnerability information
Yahoo will stop giving T-shirts as a reward for finding security vulnerabilities after a public shaming it's calling "t-shirt gate." Read More

US demanded access to encryption keys of email provider Lavabit
The U.S. government demanded from email service provider Lavabit access to all user communications and a copy of the encryption keys used to secure web, instant message and email traffic for its investigation into several Lavabit user accounts, according to a post on the Facebook page of founder Ladar Levison. Read More


WEBCAST: Dell VMware

Key Data Protection Challenges Facing Today's Enterprises
The data avalanche is accelerating. IDC estimates that the "digital universe" -- which is the total of all digital data created (and replicated) -- will reach 4 zettabytes this year. That's almost 50% more than 2012 volumes, and nearly four times the amount created and replicated in 2010. View Now

Mocana unwraps protection for iOS 7 apps
Mocana will soon allow companies to wrap iOS 7 apps in a layer of security software designed to insulate enterprise data from hackers who are becoming increasingly interested in smartphones. Read More

Senator vows fierce defense of NSA data collection, surveillance programs
Massive data collection and surveillance programs at the U.S. National Security Agency are necessary to keep the nation safe from terrorism, several senators said Wednesday. Read More

McAfee sets sandbox appliance to explode stealthy malware
McAfee today unveiled a security appliance it calls McAfee Advanced Threat Defense which uses sandboxing technology to open incoming files to safely "explode" them to see if they contain stealthy malware. Read More


SPECIAL REPORT:

Tools and strategies to keep the BYOD chaos under control
One key to a successful BYOD program is mobile device management (MDM), where carefully chosen tools and policies let companies maintain control. However, there s a lot of movement in the market and a number of MDM approaches to consider which makes your job more challenging. To get you started, we assembled advice from IT leaders who have successfully deployed an MDM solution.

BOOK GIVEAWAY:

We're giving away 5 copies of each of these two new books to give to some lucky readers. Enter today for your chance to win!

The Official Ubuntu Server Book, 3rd Ed.
Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator.

The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.

DON'T MISS...

The 10 programming languages most likely to drive developers insane

11 foods you'll be eating in 2050

15 geeky places to visit before you die

I'll cry if I want to: Ten tech titans and their temper tantrums

7 ways to beat fingerprint biometrics


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.