Thursday, October 30, 2014

Natural defenses: 8 IT security tactics found in nature

Getting chipped: Why one privacy-obsessed editor is testing an NFC chip implant | Cybercriminals create platform for automating rogue credit card charges

ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


Natural defenses: 8 IT security tactics found in nature
IT security professionals would do well to study the ways of fish, insects and fungus for inspiration in defending against predators. Read More


WEBCAST: Centrify Corporation

Enterprise SaaS Security and Governance Considerations
The security and governance impact of SaaS-based applications has been tremendous due to a lack of IT visibility and control. This Webcast explores how to mitigate the risks in applications like Salesforce, GoogleApps, Dropbox, and more. Learn more >>

WHITE PAPER: NetBrain Technologies

A Fully Dynamic Network Mapping Solution
Accurate network diagrams are the Holy Grail in enterprise network management – most network teams know they should be documenting their networks but haven't found a universally good way of doing it. Learn More

Getting chipped: Why one privacy-obsessed editor is testing an NFC chip implant
What will happen if you wear an NFC chip implant for a year? IDG Netherlands News Editor René Schoemaker is testing just that. Read More

Cybercriminals create platform for automating rogue credit card charges
The developers claim it can emulate human interaction to trick payment gateways. Read More

WIN THIS BOOK: Programming in C, 4th Edition
We've got 5 copies to give to some lucky readers. But hurry! The drawing ends Friday. Read More

Attack campaign infects industrial control systems with BlackEnergy malware
Customers of three SCADA human-machine interface products from different vendors were potentially affected, ICS-CERT said. Read More


: WhiteHat Security, Inc.

Application Security eGuide
In this eGuide, CSO along with sister publications Computerworld, CIO, and Networkworld examine the latest trends and thinking in application security. Read on to learn how to better protect the applications your organization develops and uses. Learn more >>

Gigamon says it can analyze attacker SSL traffic without hitting performance
Attackers are increasingly using SSL to encrypt data they steal, which poses challenges for security. Read More

Hackers target unclassified White House network
The hackers are said to be working for the Russian government, according to a news report. Read More

Security vendor coalition cleans 43,000 malware infections used for cyberespionage
The removed tools were used by a prolific Chinese cyberespioange group dubbed Axiom. Read More

'ScanBox' keylogger targets Uyghurs, US think tank, hospitality industry
The JavaScript-based attack doesn't put malware on a computer's disk. Read More

Secretive, unblockable Verizon perma-cookies kick up privacy concerns
Verizon is messing with your web traffic sent via its wireless network, and that has security researchers troubled. Read More


ITWORLD GIVEAWAYS:

We've got 5 copies of each of this books to give to some lucky ITworld readers. Enter now for your chance to win!

Help Your Kids with Computer Coding
Take your kids from browsing to building the web. Fun projects throughout let kids start putting their computer skills into practice and build their own code using Scratch programming and Python. Enter now!

Introduction to Agile Methods
If you want to understand Agile and become conversant with Agile values, principles, framework, and processes, this book is the place to start. Enter now!

Programming in C, 4th Edition
Learn C by example, with complete C programs used to illustrate each new concept along the way. Enter now!

SALARY SURVEY:

What's your earning power? How does it compare with your peers'?

With help from you and your IT colleagues across the country, our sister site Computerworld will shine a bright light on IT compensation trends. As our way of saying thank you, survey participants can enter a drawing to win one of 3 American Express gift cards for $500! Take the survey now!

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


title>

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.