Tuesday 20 August 2013

7 IT security skills certifications on the rise

  DARPA wants computers that fuse with higher human brain function | Attackers use Ramnit malware to target Steam users

 
  Network World Security

Forward this to a Friend >>>


7 IT security skills certifications on the rise
A number of IT security skills certifications requiring candidates to pass exams have sharply gained in terms of demand and pay value, according to a new Foote Partners report. Read More
 


WHITE PAPER: McAfee

Advanced Malware Nowhere to Hide with a Layered Defense
Smart and malicious advanced malware is targeted stealthy, evasive, and adaptive. Sandboxing and other stand-alone products can't do the job on their own. This editorial brief explains why you need an arsenal of layered, integrated defenses to protect against these sophisticated threats. View Now

RESOURCE COMPLIMENTS OF: LogMeIn

Powerful and secure remote support with LogMeIn Rescue
For companies that want to compete in their industry, improving the customer experience is a top priority. To do that, having an on-demand remote support solution is essential. That's why companies around the world choose LogMeIn Rescue to provide powerful, secure support of any device, anytime, anywhere. Rescue offers a simple, reliable interface packed with all the features technicians want. Check out LogMeIn Rescue to learn more and start your free trial today.

DARPA wants computers that fuse with higher human brain function
In the never-ending quest to get computers to process, really understand and actually reason, scientists at Defense Advanced Research Projects Agency want to look more deeply into how computers can mimic a key portion of our brain. Read More
 

Attackers use Ramnit malware to target Steam users
A new variant of the Ramnit financial malware is using local Web browser injections in order to steal log-in credentials for Steam accounts, according to researchers from security firm Trusteer. Read More
 


WHITE PAPER: IBM

Security First Insurance
Using IBM Content Analytics and ECM software, the insurer enhances service to policyholders no matter which channels they use to get in touch. Learn More.

"Jekyll" test attack sneaks through Apple App Store, wreaks havoc on iOS
Acting like a software version of a Transformer robot, a malware test app sneaked through Apple's review process disguised as a harmless app, and then re-assembled itself into an aggressive attacker even while running inside the iOS "sandbox" designed to isolate apps and data from each other. Read More
 

Encryption is less secure than we hoped
Read More
 


WHITE PAPER: McAfee

Adapt Layered Defenses for Comprehensive Malware Protection
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats. View Now

Google says it is not answerable in the UK in Safari cookies privacy suit
  Google has told British consumers in a privacy claim that it does not have to answer to English courts and U.K. privacy laws don't apply to it, according to the law firm for the plaintiffs. Read More
 

17 epic Microsoft Windows Auto Update meltdowns
These legendary clunkers made Patch Tuesday a living hell for Windows users the world over Read More
 

Software-defined networking explained
Understand how SDN will change everything in 10 easy steps Read More
 

 

SLIDESHOWS

15 more useful Cisco sites

In our never ending effort to uncover the most useful sites for Cisco users, we've come up with 15 more!

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 hottest IT jobs: Developers, developers, developers

2. The last days of Unix

3. 'Jekyll" test attack sneaks through Apple App Store

4. The 9 ugliest allegations of China-based IP theft

5. Microsoft restores Outlook.com after three-day outage

6. 15 most powerful Big Data companies

7. iPhone 6 rumor rollup for the week ending Aug. 16

8. Cisco's 4,000 job cuts won't touch new acquisition Sourcefire

9. iPad 5 rumor rollup for the week ending Aug. 14

10. Google to encrypt cloud storage data by default


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as buzzhairs@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment