Thursday, November 27, 2014

Home Depot spent $43 million on data breach in just one quarter

  Home Depot spent $43 million on data breach in just one quarter | Network security needs big data

 
  ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


BOOK GIVEAWAY: Effective Ruby: 48 Specific Ways to Write Better Ruby
Learn how to harness Ruby's full power to write more robust, efficient, maintainable, and well-performing code. We've got 5 copies to give to some lucky readers. Enter now for your chance to win! Read More
 


: Venafi

Securing Keys and Certificates to Critical Assets
Today's most devastating cyber attacks—including ShellShock, Heartbleed and Zombie Zero—prey on trust. And that puts your digital certificates at risk. This informative resource center explores how next-generation trust protection can help you combat today's attacks, ensuring trusted access to critical assets. Learn More

WHITE PAPER: Kaseya

5 Ways to Reduce the Risk of Cybercrime to Your Business
Cybercrime is on the rise. In fact, the risks and costs of cybercrime continue to increase each year. Don't be one of the many organizations naively clinging to the belief that a breach won't happen to them. As an IT professional, you need to take active steps to reduce the risk of cybercrime to your business. Reduce your risk today. Learn more

Home Depot spent $43 million on data breach in just one quarter
The retailer expects 'significant' ongoing expenses from the breach. Read More
 

Network security needs big data
As the inadequacies of perimeter-centric defenses become clearer, the zero-trust model grows more appealing. As for ZTM, it will need big data to succeed. Read More
 

'Less' means more to malware authors targeting Linux users
Using the "less" Linux command to view the contents of files downloaded from the Internet is a dangerous operation that can lead to remote code execution, according to a security researcher.At first glance, less appears to be a harmless command that outputs a file's content to a terminal window and allows the users to navigate forward and backward through it. Less does not allow file editing, which is a job for file editors like the widely used vi, but has the benefit of displaying data on the fly without needing to load an entire file into memory. This is useful when dealing with large files.Less is frequently used to view text files, but on many Linux distributions, including Ubuntu and CentOS, it supports many more file types including archives, images and PDF. That's because, on these systems, less is extended through a script called lesspipe that relies on different third-party tools to process files with various extensions.To read this article in full or to leave a comment, please click here Read More
 

5 PCI Compliance gaps
With the holiday shopping season coming up, and crooks lining up to take advantage of the stress and confusion, this is a good time for merchants to review their payment security procedures. Read More
 

10-point smartcard checklist for merchants
Just about a year from now, retail merchants who currently accept only magnetic stripe payment cards will have to start accepting chip-based smart cards as well. Read More
 


WHITE PAPER: Samsung

Secure Mobility Myth Buster
As organizations try to make sense of the Secure Mobility cacophony, they most often encounter a collection of confusing and conflicting myths instead of useful information to guide key evaluation and acquisition decisions. This document reviews the more common myths and misconceptions about secure mobility and EMM. Learn More

Google to Apps users: take more responsibility for protecting your accounts
Changes to the suite's security features should make it easier for employees to become more active in protecting themselves from hackers. Read More
 

Adobe tries again to fix Flash vulnerability
Malware authors found a way to continue to exploit a vulnerability patched last month. Read More
 

60 things European legislators don't want Canada to learn about air passengers
The European Parliament has put on hold an agreement to continue sending passenger data to Canadian law enforcers Read More
 

Regin malware linked to attacks on Belgacom, well-known cryptographer
Regin's targets have led to suspicions that the U.S. and U.K. may have created it. Read More
 

 

INSIDER
12 security problems that EMV and tokenization won't solve
On November 1 of next year, merchants that aren't ready to accept chip-based cards instead of the current magnetic-stripe cards will become liable for fraudulent transactions that today are covered by the credit card companies. Read More

 

 

NOVEMBER GIVEAWAYS

Now, here's something to be thankful for... We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter now for your chance to win!

Effective Ruby: 48 Specific Ways to Write Better Ruby
If you're an experienced Ruby programmer, Effective Ruby will help you harness Ruby's full power to write more robust, efficient, maintainable, and well-performing code. Enter now!

Responsive Mobile Design: Designing for Every Device
Learn principles, techniques, and best practices for delivering a successful experience to all users on all devices. Enter now!

INSIDER

Get exclusive access to premium articles, product guides, reviews and more.

- 8 tech buzzwords that you need to know
 

- Free and cheap ways to learn about network administration
 

- IT resumes: Lies, half-truths and embellishments

SALARY SURVEY

What's your earning power? How does it compare with your peers'?
 
With help from you and your IT colleagues across the country, our sister site Computerworld will shine a bright light on IT compensation trends. As our way of saying thank you, survey participants can enter a drawing to win one of 3 American Express gift cards for $500! Take the survey now!


 
 

Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

 


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.