Tuesday, March 31, 2015

GitHub recovering from massive DDoS attacks

GitHub recovering from massive DDoS attacks | 5 keys to hiring security talent

ITworld Security Strategies

Google Plus LinkedIn Facebook Twitter


ITworld reader survey: $250 for your thoughts
ITworld is conducting a short survey about unified communications and collaboration, and we value your feedback. This confidential survey should take no more than 10 minutes of your time, and as a thank-you for participating you may enter a sweepstakes to win a $250 cash prize. Read More


WHITE PAPER: Level 3 Communications

A Network-based Security Solution
As security requirements and cyber threats keep evolving, network-based security that relies on monitoring command and control servers, suspect sites and IP addresses, and Netflow sessions, as well as looking for unusual activity, brings many benefits. Learn More

In this Issue


WHITE PAPER: Level 3 Communications

Secure Pipes: Changing the Expectation of Your ISPs
The time has come to change the way that security is conducted. The era of "bolt-on" security solutions needs to come to an end, or at least be recalibrated. Learn More

GitHub recovering from massive DDoS attacks
The attacks were aimed at two GitHub-hosted projects fighting Chinese censorship Read More

5 keys to hiring security talent
Recruiting IT security professionals can be tough, unless you have a great elevator pitch. The CSO of an insurance company provides advice on telling job candidates a compelling story. Read More

The state of open source security
Recent high-profile vulnerabilities have put the lie to the 'many eyes' theory -- but also driven real progress in securing the open source ecosystem. Read More

Flaw in common hotel router threatens guests' devices
Corporate travelers should be warned that a vulnerable Wi-Fi router commonly used in hotels is easily compromised, putting guests passwords at risk and opening up their computers to malware infections and direct attacks. Read More

The things end users do that drive security teams crazy
To protect users from public embarrassment their identities have been withheld in these true stories of failures to follow security protocol. Read More

Cisco patches autonomic networking flaws in IOS routers and switches
The flaws could allow attackers to gain limited access over affected devices or to disrupt their normal operation Read More

Study: One-third of top websites vulnerable or hacked
According to a new report from Menlo Security, one out of three of the top million websites are either vulnerable to hacking or already hacked. Read More


WHITE PAPER: Level 3 Communications

The Top Five Security Threats to Your Business
Cyber security breaches are more common now than they have ever been. What exactly are these threats? How are they carried out and how can they impact business? The Level 3(SM) Advanced Threat Intelligence team has identified the top five most common security threats that you should know about. Learn More

What happens with data from mobile health apps?
Health IT experts caution of lax cyber hygiene in the medical community, urge policymakers to address privacy issues. Read More

Congress moves quickly on cyberthreat information sharing
A House committee approves a second bill, despite concerns about consumer privacy Read More

British Airways notifies frequent flyers of possible breach of their accounts
Many users had their reward points removed from their accounts as a precaution Read More

9 security gadgets for mobile devices
If you use your smartphone or tablet for work, you need to keep your data secure when you're on the go. We look at nine gadgets that try to keep your important data out of the hands of others. Read More

Startup takes the effort out of endpoint detection and response
Startup Red Canary is offering an endpoint detection and response service based in the cloud that is backed up by a team of analysts who weed out false alarms. Read More

An SDN vulnerability forced OpenDaylight to focus on security
Open-source software projects are often well intended, but security can take a back seat to making the code work.OpenDaylight, the multivendor software-defined networking (SDN) project, learned that the hard way last August after a critical vulnerability was found in its platform.It took until December for the flaw, called Netdump, to get patched, a gap in time exacerbated by the fact that the project didn't yet have a dedicated security team. After he tried and failed to get in touch with OpenDaylight, the finder of the vulnerability, Gregory Pickett, posted it on Bugtraq, a popular mailing list for security flaws.To read this article in full or to leave a comment, please click here Read More

LAST CHANCE: Enter to win a copy of "Effective Python: 59 Specific Ways to Write Better Python"
We've got 5 copies to give to some lucky readers. But hurry, the drawing ends tonight. Enter now for your chance to win! Read More


SURVEY SAYS...

Got 10 minutes? Take ITworld's unified communications and collaboration survey and enter for a chance to win $250. Take the survey now!

BECOME AN ITWORLD INSIDER

Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

- R programming beginner's guide
- IT Resume Makeover: Emphasize your 'X factor'
- 4 open source monitoring tools that deserve a look
- Free and cheap ways to learn about IT security
- PowerShell for beginners: Scripts and loops
- Six Ted talks that can change your career

What are you waiting for? Sign up today!


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2015 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.