Tuesday, 3 September 2013

Is it Time to Start Hacking the Hackers?

What is a Vulnerability? | NIST Subjects Draft Cybersecurity Framework to More Public Scrutiny

CIO Security

Forward this to a Friend >>>


Is it Time to Start Hacking the Hackers?
In the light of unprecedented attacks by cybercriminals against businesses that span every industry, this question has come to the fore: Is it time to fight back? Read More


WHITE PAPER: Seeburger

Implement One Platform for Secure & Efficient Data Transfer
Operating on a fragmented IT infrastructure is a reality for many enterprises. The changing needs of business today requires an up-to-date IT infrastructure that's cost-effective and flexible. Learn about the benefits of using a single platform. View Now

RESOURCE COMPLIMENTS OF: Prolexic Technologies

Everything you need to know about SYN reflection attacks
SYN reflection attacks are used against targets that support TCP. If a successful multi-step "handshake" cannot be completed between computers, repeated attempts are made. SYN reflection attacks misdirect these handshakes, flooding other machines with communication requests. Download the new white paper to learn more about this new threat. Download the full SYN Reflection white paper >>>

What is a Vulnerability?
Judging by initial appearances, our security testing turned up a ton of vulnerabilities nearly 150 of them. In reality, however, none represented actual issues in the Huawei switch. Read More

NIST Subjects Draft Cybersecurity Framework to More Public Scrutiny
NIST seeks feedback from industry on common practices to secure IT systems Read More

U.S. Appetite for Internet User Data Not Unique
Analysis of transparency reports from Google, Microsoft, Skype show other countries equally -- or more -- demanding. Read More


WHITE PAPER: Apprenda

Comparing Cloud Platform Options
Download this comprehensive report from Gartner that compares cloud platform options for building and deploying .NET applications and evaluates their fit against common enterprise criteria. Learn More

Under Legal Pressure, Facebook Clarifies How it Uses Your Data
The clarifications come in response to a recent court ruling Read More

Facebook's New Face Recognition Policy Astonishes German Privacy Regulator
A German privacy regulator is astonished that Facebook has added facial recognition to a proposed new privacy policy it published on Thursday. Read More

Microsoft: Talks with US Gov't on Surveillance Transparency Break Down
Microsoft and Google will proceed with their lawsuits asking that they be able to publish surveillance request numbers Read More

VMware CTO Casado on Network Virtualization, Security and Competition with Cisco
How do you bring the virtualization operations model to networking? A That will be the job of Martin Casado, CTO of networking and security at VMware which this week launched NSX, the company's over-arching network virtualization package. Casado was one of the creators of OpenFlow, the protocol that spawned the software defined networking (SDN) movement. He was also the CTO of OpenFlow software provider Nicira, which VMware purchased in 2012, and which provides the basis for much of NSX. Casado met with Network World Senior Editor Ellen Messmer to talk about NSX networking and security implications. Read More


Hot Picks for the Week

1. 10 Things BlackBerry Z10 Does That iPhone Can't

2. The 20 Best iPhone/iPad Games of 2013 So Far

3. Half of Companies Will Require BYOD By 2017

4. Top 10 Programming Skills That Will Get You Hired

5. 25 Crazy and Scary Things the TSA has Found on Travelers


Get more CIO peer perspective online
LinkedIn | Facebook | Twitter

You are currently subscribed to cio_security as buzzhairs.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact CIO.com, please send an e-mail to online@cxo.com.

Copyright (C) 2013 CIO, 492 Old Connecticut Path, P.O. Box 9208, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@cxo.com. **


No comments:

Post a Comment