www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-14T11:59:34+00:00 www.secnews.physaphae.fr Network World - Magazine Info The problem with mobile and app voting 2020-02-04T09:24:00+00:00 https://www.networkworld.com/video/100959/the-problem-with-mobile-and-app-voting#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1524530 False Hack,Guideline None None Network World - Magazine Info Protecting the IoT: 3 things you must include in an IoT security plan 2019-02-27T07:39:00+00:00 https://www.networkworld.com/article/3343184/protecting-the-iot-3-things-you-must-include-in-an-iot-security-plan.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1044895 False Hack,Threat,Guideline None None Network World - Magazine Info Build security into your IoT plan or risk attack 2019-01-28T09:11:00+00:00 https://www.networkworld.com/article/3336269/internet-of-things/build-security-into-your-iot-plan-or-risk-attack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=1012332 False Guideline None None Network World - Magazine Info This Linux tool could improve the security of IoT devices How to improve IoT security + Those earlier platforms have been hardened, updates have been automated, and the app discovery and installation have been made trustworthy. IoT developers need to follow their lead. To read this article in full or to leave a comment, please click here]]> 2017-08-24T07:33:00+00:00 https://www.networkworld.com/article/3219725/internet-of-things/this-linux-tool-could-improve-the-security-of-iot-devices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=400384 False Guideline None None Network World - Magazine Info IDG Contributor Network: Educating the public about security – are we doing it all wrong? Breach Level Index, 1,792 data breaches led to almost 1.4 million data records being compromised worldwide, an increase of 86% compared to 2015. Identity theft was the leading type of data breach last year, accounting for 59% of all data breaches. These numbers have helped raise public awareness around the serious threats to personal data that exist in the modern era, and awareness is also growing for some of the solutions that businesses and individuals can use to minimize the risks from data breaches. But is it enough?To read this article in full or to leave a comment, please click here]]> 2017-05-23T09:35:00+00:00 http://www.networkworld.com/article/3197383/security/educating-the-public-about-security-are-we-doing-it-all-wrong.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=367824 False Guideline None None Network World - Magazine Info IDG Contributor Network: Data breaches: It\'s still personal blog post last September, I highlighted how data breaches for the first half of 2016 shifted from stolen credit card data and financial information to the theft of something much more personal-identities. Unsurprisingly, this trend continued throughout the remainder of the year.According to the recently released Breach Level Index, 1,792 data breaches led to almost 1.4 million data records being compromised worldwide, an increase of 86 percent compared to 2015. Once again, identity theft was the leading type of data breach last year, accounting for 59 percent of all data breaches. To read this article in full or to leave a comment, please click here]]> 2017-05-01T12:45:00+00:00 http://www.networkworld.com/article/3193155/security/data-breaches-its-still-personal.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=360535 False Guideline None None Network World - Magazine Info Enterprise security technology consolidation Is your company spending on the right security technologies? + So, what's the problem? Point tools aren't really designed to talk with one another, leaving human beings to bridge the communications, intelligence and technology gaps between them. Furthermore, each individual tool requires training, deployment, configuration and ongoing operational support. More tools, more needs.To read this article in full or to leave a comment, please click here]]> 2017-04-27T07:14:00+00:00 http://www.networkworld.com/article/3192874/security/enterprise-security-technology-consolidation.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359871 False Guideline None None Network World - Magazine Info Next-gen IoT botnet Hajime nearly 300K strong Mirai botnet that devastated high-profile websites last fall, leading some to think the internet had been broken.Researchers at Kaspersky Lab lured devices infected with the Hajime worm to announce themselves to a Kaspersky honeypot, checked out whether they were actually infected and added them up. They came up with the number 297,499, says Igor Soumenkov, principal researcher at Kaspersky Lab.An earlier estimate by Symantec put the size at tens of thousands. Estimates of the number of infected devices in Mirai botnets have put it about 400,000, but the number of devices that might be infected with the Hajime worm is 1.5 million, says Dale Drew, the CSO of Level 3, which has been building a profile of behavioral classifiers to identify it so it can be blocked.To read this article in full or to leave a comment, please click here]]> 2017-04-27T06:31:00+00:00 http://www.networkworld.com/article/3192925/security/next-gen-iot-botnet-hajime-nearly-300k-strong.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359873 False Guideline None None Network World - Magazine Info Report: Top 25 IT security products IT Central Station, which collects reviews from verified enterprise IT product users, has compiled a report that identifies 25 top-rated products in security categories such as cloud security, firewalls, security information and event management (SIEM), application security and internet of things (IoT) security.IT Central Station selected the product leaders in each security category. The report uses a scoring methodology based on a combination of buyer interest, the number of reviews (at least 10), and the average rating in those reviews.To read this article in full or to leave a comment, please click here]]> 2017-04-26T10:13:00+00:00 http://www.networkworld.com/article/3192543/security/report-top-25-it-security-products.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=359496 False Guideline None None Network World - Magazine Info Bring Your Own Authentication is upending online security practices To read this article in full or to leave a comment, please click here]]> 2017-04-24T07:37:00+00:00 http://www.networkworld.com/article/3191964/security/bring-your-own-authentication-is-upending-online-security-practices.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358423 False Guideline None None Network World - Magazine Info Securing risky network ports To read this article in full or to leave a comment, please click here]]> 2017-04-24T04:44:00+00:00 http://www.networkworld.com/article/3191513/network-security/securing-risky-network-ports.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=358340 False Guideline None None Network World - Magazine Info Drupal fixes critical access bypass vulnerability To read this article in full or to leave a comment, please click here]]> 2017-04-20T14:09:50+00:00 http://www.networkworld.com/article/3191448/security/drupal-fixes-critical-access-bypass-vulnerability.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357910 False Guideline None None Network World - Magazine Info Humans are (still) the weakest cybersecurity link BakerHostetler Theodore Kobus, BakerHostetler's Privacy and Data Protection team.To read this article in full or to leave a comment, please click here]]> 2017-04-19T13:10:00+00:00 http://www.networkworld.com/article/3191129/security/humans-are-still-the-weakest-cybersecurity-link.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357620 False Guideline None None Network World - Magazine Info Surveys show high hopes, deep concerns about IoT BPI Network, an organization of business leaders.To read this article in full or to leave a comment, please click here]]> 2017-04-19T08:17:55+00:00 http://www.networkworld.com/article/3191039/internet-of-things/surveys-show-high-hopes-deep-concerns-about-iot.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=357636 False Guideline None None Network World - Magazine Info How will future cars stay up-to-date? Make them open like a PC Bruce Perens, a leading open source advocate.  “And I would like to guide it in a somewhat different direction.”His fear is that consumers who buy next-generation cars will face obstacles to modifying or repairing them -- like purchasing a smartphone, only far more expensive, with manufacturers in sole control over the tech upgrades.To read this article in full or to leave a comment, please click here]]> 2017-04-14T05:59:29+00:00 http://www.networkworld.com/article/3189983/car-tech/how-will-future-cars-stay-up-to-date-make-them-open-like-a-pc.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356829 False Guideline None None Network World - Magazine Info 6 vulnerabilities to watch for on the factory floor FireEye iSIGHT Intelligence Sean McBride The problems are as far ranging as hard-coded passwords that are publicly available to vulnerabilities in Windows operating systems that are no longer supported but are necessary to run the aging gear, says Sean McBride, attack-synthesis lead analyst at FireEye iSIGHT Intelligence and author of “What About the Plant Floor? Six subversive concerns for industrial environments.”To read this article in full or to leave a comment, please click here]]> 2017-04-12T11:01:00+00:00 http://www.networkworld.com/article/3189528/security/6-vulnerabilities-to-watch-for-on-the-factory-floor.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356345 False Guideline None None Network World - Magazine Info Can AI and ML slay the healthcare ransomware dragon? healthcare organizations are prime – and relatively easy – targets for ransomware attacks. So it is no surprise that those attacks have become rampant in the past several years. The term “low-hanging fruit” is frequently invoked.But according to at least one report, and some experts, it doesn't have to be that way. ICIT – the Institute for Critical Infrastructure Technology – contends in a recent whitepaper that the power of artificial intelligence and machine learning (AI/ML) can “crush the health sector's ransomware pandemic.”To read this article in full or to leave a comment, please click here]]> 2017-04-12T06:19:00+00:00 http://www.networkworld.com/article/3188932/application-security/can-ai-and-ml-slay-the-healthcare-ransomware-dragon.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=356350 False Guideline None None Network World - Magazine Info IBM: Tax-related spam up 6,000% since Dec.; Darkweb tactics net billions Cybercrime Riding Tax Season Tides: Trending Spam and Dark Web Findings” issued today.+More on Network World: IRS Dirty Dozen: Phishing, phone cons and identity theft lead scam list for 2017+To read this article in full or to leave a comment, please click here]]> 2017-04-05T06:25:00+00:00 http://www.networkworld.com/article/3187718/security/ibm-tax-related-spam-up-6-000-since-dec-darkweb-tactics-net-billions.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=353563 False Guideline None None Network World - Magazine Info IT leaders share how they quell cybersecurity attacks To read this article in full or to leave a comment, please click here]]> 2017-04-04T13:12:00+00:00 http://www.networkworld.com/article/3187707/security/it-leaders-share-how-they-quell-cybersecurity-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=352636 False Guideline None None Network World - Magazine Info Android now the world\'s most popular operating system StatCounter reported that, for the first time ever, Android topped the worldwide OS internet usage market share. In March, looking at combined usage across desktop, laptop, tablet and mobile, Android usage hit 37.93 percent. That was enough to narrowly overtake Windows' 37.91 percent.statcounter operating systems worldwide StatCounter “This is a milestone in technology history and the end of an era,” said StatCounter CEO Aodhan Cullen. “It marks the end of Microsoft's leadership worldwide of the OS market, which it has held since the 1980s. It also represents a major breakthrough for Android, which held just 2.4 percent of global internet usage share only five years ago.”To read this article in full or to leave a comment, please click here]]> 2017-04-03T07:15:00+00:00 http://www.networkworld.com/article/3187011/mobile-wireless/android-is-now-the-worlds-most-popular-operating-system.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351718 False Guideline None None Network World - Magazine Info IDG Contributor Network: Information security in an insecure world To read this article in full or to leave a comment, please click here]]> 2017-04-03T04:05:00+00:00 http://www.networkworld.com/article/3186694/security/information-security-in-an-insecure-world.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=351422 False Guideline None None Network World - Magazine Info Senator: Russia used \'thousands\' of internet trolls during US election Senate hearing on Russian election hacking. The Russian government used "thousands of paid internet trolls" and bots to spread disinformation on social media.To read this article in full or to leave a comment, please click here]]> 2017-03-30T12:56:04+00:00 http://www.networkworld.com/article/3186635/security/senator-russia-used-thousands-of-internet-trolls-during-us-election.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349865 False Guideline None None Network World - Magazine Info How to fend off cyberattacks and data breaches research conducted by Symantec, the number of cyberattacks against small businesses (companies with fewer than 250 employees) has been steadily growing over the last six years, with hackers specifically targeting employees (phishing). And while distributed denial of service, or DDoS, attacks are still a leading form of cyber warfare, ransomware and malware attacks, targeting users of smartphones and internet of things (IoT) devices, as well as PCs and systems running on Macs and Linux, are also a big threat to small businesses.To read this article in full or to leave a comment, please click here]]> 2017-03-29T14:18:00+00:00 http://www.networkworld.com/article/3186468/malware-cybercrime/how-to-fend-off-cyberattacks-and-data-breaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=349012 False Guideline None None Network World - Magazine Info Expert: NY breach report highlights third-party risk in a statement released last week. "The total annual number of reported security breaches increased by 60% and the number of exposed personal records tripled."According to the report, the stolen data consisted overwhelmingly of Social Security numbers and financial account information, and hacking was the leading cause of the breaches. The 1,300 breaches involved the private data of 1.6 million state residents, and 81 percent of the breaches involved the loss of Social Security numbers or financial information.To read this article in full or to leave a comment, please click here]]> 2017-03-29T05:51:00+00:00 http://www.networkworld.com/article/3185911/security/expert-ny-breach-report-highlights-third-party-risk.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=348771 False Guideline None None Network World - Magazine Info Fortinet CISO on securing critical infrastructure: \'We can no longer bring a knife to a gunfight\' To read this article in full or to leave a comment, please click here]]> 2017-03-27T07:21:00+00:00 http://www.networkworld.com/article/3184935/security/fortinet-ciso-on-securing-critical-infrastructure-we-can-no-longer-bring-a-knife-to-a-gunfight.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=346828 False Guideline None None Network World - Magazine Info Snowden\'s ex-boss offers tips on stopping insider threats insider threats. For a brief period, he was the boss of Edward Snowden, the famous leaker who stole sensitive files from the U.S. National Security Agency. Recalling the day he learned Snowden had been behind the NSA leaks back in June 2013, Bay said he received texts about the breaking news while in a leadership meeting at a church. The first text said "Sorry man, looks like your worst nightmare came true."To read this article in full or to leave a comment, please click here]]> 2017-03-23T10:10:00+00:00 http://www.networkworld.com/article/3183277/security/snowdens-ex-boss-offers-tips-on-stopping-insider-threats.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=344539 False Guideline None None Network World - Magazine Info Now WikiLeaks threatens to disclose software vulnerabilities WikiLeaks leader Julian Assange promised that the site would work with the affected tech companies to give them exclusive access to the technical details of those exploits and would not go public with the exploits and back doors. However, it wasn't until this week that WikiLeaks got in contact with the listed tech companies, such as Microsoft, Apple and Google, according to Motherboard, the tech site run by Vice. Citing unnamed sources familiar with the matter, Motherboard said WikiLeaks has made demands on the initial contact with firms but didn't share any of the alleged CIA codes. To read this article in full or to leave a comment, please click here]]> 2017-03-23T08:25:00+00:00 http://www.networkworld.com/article/3183577/security/now-wikileaks-threatens-to-disclose-software-vulnerabilities.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=344540 False Guideline None None Network World - Magazine Info Experts: US needs a federal CISO Netskope.The job of a federal CISO is very new -- it was only created last year and filled in September with the appointment of retired brigadier general Gregory Touhill. He was previously the deputy assistant secretary for cybersecurity and communications at the Department of Homeland Security.To read this article in full or to leave a comment, please click here]]> 2017-03-23T06:06:00+00:00 http://www.networkworld.com/article/3184156/security/experts-us-needs-a-federal-ciso.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=344265 False Guideline None None Network World - Magazine Info Cisco: IOS security update includes denial of service and code execution warnings “High” that could lead to denial of service attacks or allow an invader to execute arbitrary code on an particular system.The warnings – which include Cisco's DHCP client, L2TP, Zero Touch Provisioning, HTTP server and Web user interface -- are part of what Cisco says are a twice-yearly bundle of IOS security advisories it issues to keep those users up-to-date on current IOS security issues.To read this article in full or to leave a comment, please click here]]> 2017-03-22T12:32:00+00:00 http://www.networkworld.com/article/3184204/security/cisco-ios-security-update-includes-denial-of-service-and-code-execution-warnings.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=343309 False Guideline None None Network World - Magazine Info Do you have an incident response plan in place? To read this article in full or to leave a comment, please click here]]> 2017-03-17T05:46:00+00:00 http://www.networkworld.com/article/3181988/security/do-you-have-an-incident-response-plan-in-place.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339893 False Guideline None None Network World - Magazine Info Experts divided on value of Cyber National Guard To read this article in full or to leave a comment, please click here]]> 2017-03-17T05:43:00+00:00 http://www.networkworld.com/article/3182090/leadership-management/experts-divided-on-value-of-cyber-national-guard.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339894 False Guideline None None Network World - Magazine Info Smackdown: Office 365 vs. G Suite management Why (and how) you should manage Windows 10 PCs like iPhones. | The essentials for Windows 10 installation: Download the Windows 10 Installation Superguide today. ] Admin console UI. Both the Office 365 and G Suite admin consoles are well designed, providing clean separation of management functions and clear settings labels, so you can quickly move to the settings you want and apply them.To read this article in full or to leave a comment, please click here]]> 2017-03-16T06:01:00+00:00 http://www.networkworld.com/article/3181726/leadership-management/smackdown-office-365-vs-g-suite-management.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=339007 False Guideline None None Network World - Magazine Info Four charged, including Russian gov\'t agents, for massive Yahoo hack hackers had managed to steal personal data on more than 500 million users during an attack in late 2014. The stolen data included names, email addresses, telephone numbers and hashed passwords. Blame for the attack was put on a "state-sponsored" group.On Wednesday, the FBI said that group was the Russian Federal Security Service, the FSB, and it identified agents Dmitry Dokuchaev and Igor Sushchin as leaders of the attack.To read this article in full or to leave a comment, please click here]]> 2017-03-15T09:07:14+00:00 http://www.networkworld.com/article/3181308/legal/four-charged-including-russian-govt-agents-for-massive-yahoo-hack.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=338038 False Guideline Yahoo None Network World - Magazine Info The NSA\'s foreign surveillance: 5 things to know Section 702 of the Foreign Intelligence Surveillance Act (FISA).U.S. residents who communicate with foreign targets of the NSA surveillance have their data swept up in what the NSA calls "incidental" collection. The FBI can then search those communications, but it's unclear how often that happens.To read this article in full or to leave a comment, please click here]]> 2017-03-14T08:55:41+00:00 http://www.networkworld.com/article/3180805/security/the-nsas-foreign-surveillance-5-things-to-know.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=337110 False Guideline None None Network World - Magazine Info Google tries to beat AWS at cloud security To read this article in full or to leave a comment, please click here]]> 2017-03-10T05:34:00+00:00 http://www.networkworld.com/article/3179453/security/google-tries-to-beat-aws-at-cloud-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=333699 False Guideline None None Network World - Magazine Info Juniper product development chief resigns, company resets engineering makeup Juniper Development and Innovation group, where he replaced Rami Rahim who is now the company's CEO.To read this article in full or to leave a comment, please click here]]> 2017-03-08T08:48:00+00:00 http://www.networkworld.com/article/3178424/security/juniper-product-development-chief-resigns-company-resets-engineering-makeup.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=331642 False Guideline None None Network World - Magazine Info Android gets patches for critical OpenSSL, media server and kernel driver flaws To read this article in full or to leave a comment, please click here]]> 2017-03-07T07:40:00+00:00 http://www.networkworld.com/article/3177787/security/android-gets-patches-for-critical-openssl-media-server-and-kernel-driver-flaws.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=330125 False Guideline None None Network World - Magazine Info Microsoft paying a bug bounty of $30,000 last week's blog post on Intel price cuts. As it turns out, I have been informed that Intel didn't cut the prices, Micro Center cut them as a loss leader, something it frequently does. It doesn't change the bargain prices, just the motivation. So, I wanted to set the record straight on that. Onward. Microsoft is looking for a few good bugs. And people who will keep it quiet. OK, so I have no evidence of direct causality, but it seems convenient. Over the past few weeks, Google has embarrassed Microsoft twice by publicly disclosing security vulnerabilities in Windows 10 that still have not been patched after 90 days. Google has no mercy with its Zero Day disclosures and plays no favorites. Any company that does not fix a bug by 90 days after Google informs them of it will be hung out to dry. To read this article in full or to leave a comment, please click here]]> 2017-03-06T09:54:00+00:00 http://www.networkworld.com/article/3177211/security/microsoft-paying-a-bug-bounty-of-30000.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=328714 False Guideline None None Network World - Magazine Info IDG Contributor Network: To improve information security, enterprises and government must share information cooperation between the private and public sectors. This leads to the questions of what kind of relationship should the government and companies have, how can they work together and what's preventing this process from happening?To read this article in full or to leave a comment, please click here]]> 2017-03-01T08:28:00+00:00 http://www.networkworld.com/article/3174682/security/to-improve-information-security-enterprises-and-government-must-share-information.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=325592 False Guideline Yahoo None Network World - Magazine Info Microsoft may owe you $100 if you bought from the Microsoft Store To read this article in full or to leave a comment, please click here]]> 2017-02-28T14:30:00+00:00 http://www.networkworld.com/article/3175683/security/microsoft-may-owe-you-100-if-you-bought-from-the-microsoft-store.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=324699 False Guideline None None Network World - Magazine Info Google reveals Microsoft bug affecting IE and Edge two unpatched bugs, and now it's doing it again. A security flaw in Microsoft Edge and Internet Explorer was first reported to Microsoft Nov. 25, 2016. Microsoft was offered the standard 90-day lead to patch the issue before Google announced it to the world. With the cancellation of this month's Patch Tuesday, Microsoft failed to issue a fix, and now the bug is out there for the whole world to see. To read this article in full or to leave a comment, please click here]]> 2017-02-28T13:36:00+00:00 http://www.networkworld.com/article/3175714/security/google-reveals-microsoft-bug-affecting-ie-and-edge.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=324700 False Guideline None None Network World - Magazine Info Oldies but goodies make presence felt amid glitzy startups at RSAC To read this article in full or to leave a comment, please click here]]> 2017-02-27T02:15:00+00:00 http://www.networkworld.com/article/3174097/security/oldies-but-goodies-make-presence-felt-amid-glitzy-startups-at-rsac.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=322900 False Guideline None None Network World - Magazine Info IDG Contributor Network: 3 security analytics approaches that don\'t work (but could) - Part 2 drawbacks of security analytics approaches I described in part 1 of this series, it's possible to build such solutions today, giving users a way to rapidly identify their highest-priority security threats at very large scale without being deluged with false-positive alerts or being forced to hire an army of extra analysts.To read this article in full or to leave a comment, please click here]]> 2017-02-24T06:03:00+00:00 http://www.networkworld.com/article/3173383/analytics/three-security-analytics-approaches-that-dont-work-but-could-part-2.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=322485 False Guideline None None Network World - Magazine Info How to assess security automation tools here to subscribe.  During my recent trip to Tel Aviv to attend CyberTech 2017, I had a one-on-one conversation with Barak Klinghofer, co-founder and CTO of Hexadite. He gave me a preview of an educational presentation he was to give two weeks later at the RSA Conference. His insight is worth repeating for anyone looking to add automation tools to their security toolset.As I saw at CyberTech, and I'm sure was the case at RSA, the hottest topics were security automation, automated incident response and security orchestration. These can be confusing terms, as every vendor describes them a little bit differently.To read this article in full or to leave a comment, please click here]]> 2017-02-23T12:15:00+00:00 http://www.networkworld.com/article/3173690/security/how-to-assess-security-automation-tools.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=321629 False Guideline None None Network World - Magazine Info Eleven-year-old root flaw found and patched in the Linux kernel found the vulnerability, plans to publish an exploit for it a few days.To read this article in full or to leave a comment, please click here]]> 2017-02-23T07:11:33+00:00 http://www.networkworld.com/article/3173608/security/eleven-year-old-root-flaw-found-and-patched-in-the-linux-kernel.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=321646 False Guideline None None Network World - Magazine Info How the DOT discovered its network was compromised by shadow IT leading a turnaround mission at the department since his arrival, but when it came time for the Office 365 rollout, he quickly discovered how chaotic the situation was, with hundreds of unauthorized devices running undetected on the sprawling network.To read this article in full or to leave a comment, please click here]]> 2017-02-22T10:55:00+00:00 http://www.networkworld.com/article/3172512/security/how-dot-cio-discovered-a-network-compromised-by-shadow-it.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=320810 False Guideline None None Network World - Magazine Info Microsoft pushes out critical Flash Player patches with one week delay MS17-005, is rated critical for Windows 8.1, Windows RT 8.1, Windows 10 and Windows Server 2016, and moderate for Windows Server 2012 and Windows Server 2012 R2. On these Windows versions, Flash Player is bundled by default with Internet Explorer 11 and Microsoft Edge, so Microsoft delivers patches for it through Windows Update.This month's Flash Player patches were released by Adobe on February 14 and address 13 vulnerabilities that could lead to remote code execution. Typically Adobe releases patches on the same day as Microsoft, a day known in the industry as Patch Tuesday. This month, though, Microsoft postponed its updates at the last minute due to an unspecified issue that, it said, could have affected customers.To read this article in full or to leave a comment, please click here]]> 2017-02-22T05:38:22+00:00 http://www.networkworld.com/article/3172598/security/microsoft-pushes-out-critical-flash-player-patches-with-one-week-delay.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=320445 False Guideline None None Network World - Magazine Info IDG Contributor Network: Cisco Rapid Threat Containment quickly detects, removes infected end points Cisco acquired SourceFire, and cybersecurity industry legends such as Marty Roesch took leadership roles within the company, Cisco's initiative is for all security products to be open and to interoperate with other products.Another very large acquisition was OpenDNS, and the CEO from OpenDNS now leads all of the security business at Cisco. The culture is all about Cisco products, as well as non-Cisco products, working better together. + Also on Network World: Cisco ONE simplifies security purchasing + For many, it's shocking to think about Cisco as a vendor pushing for openness and standards. I'm not sure why because Cisco has spent its life creating networking protocols and then helping them to become standards available to all. But I digress.To read this article in full or to leave a comment, please click here]]> 2017-02-21T09:40:00+00:00 http://www.networkworld.com/article/3164571/security/cisco-rapid-threat-containment-quickly-detects-removes-infected-end-points.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=319488 False Guideline None None Network World - Magazine Info 5 open source security tools too good to ignore To read this article in full or to leave a comment, please click here]]> 2017-02-21T06:12:00+00:00 http://www.networkworld.com/article/3172398/security/5-open-source-security-tools-too-good-to-ignore.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=319490 False Guideline None None Network World - Magazine Info IRS Dirty Dozen: Phishing, phone cons and identity theft lead scam list for 2017 usual suspects in its annual look at the Dirty Dozen scams you need to watch out for this year. It should come as no surprise that the IRS saw a big spike in phishing and malware incidents during the 2016 tax season because the agency has been very public about its battle with this scourge. Just this month the IRS issued another warning about what it called a dangerous, evolving W-2 scams that are targeting corporations, school districts and other public and private concerns.To read this article in full or to leave a comment, please click here]]> 2017-02-17T11:09:00+00:00 http://www.networkworld.com/article/3171683/security/irs-dirty-dozen-phishing-phone-cons-and-identity-theft-lead-scam-list-for-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=317670 False Guideline None None Network World - Magazine Info IT leaders say it\'s hard to keep the cloud safe Intel cloud security report that surveyed 2,000 IT professionals in different countries and industries last fall.The issue isn't with the cloud itself, since trust outnumbers distrust for public clouds by more than two to one, according to Intel's survey.IT professionals told Intel that shadow IT and a shortage of cybersecurity skills are causing the most problems.To read this article in full or to leave a comment, please click here]]> 2017-02-16T05:26:00+00:00 http://www.networkworld.com/article/3170988/cloud-security/it-leaders-say-its-hard-to-keep-the-cloud-safe.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=316482 False Guideline None None Network World - Magazine Info Sophos CEO sounds the alarm on enterprise ransomware attacks admitted to paying $17,000 to get its system unlocked, and a report in October said ransomware cases were on course to quadruple in 2016 over the previous year.To read this article in full or to leave a comment, please click here]]> 2017-02-15T11:53:55+00:00 http://www.networkworld.com/article/3170765/malware/sophos-ceo-sounds-the-alarm-on-enterprise-ransomware-attacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315419 False Guideline None None Network World - Magazine Info IDG Contributor Network: 3 new information security jobs for the digital enterprise To read this article in full or to leave a comment, please click here]]> 2017-02-15T11:46:00+00:00 http://www.networkworld.com/article/3170136/careers/3-new-information-security-jobs-for-the-digital-enterprise.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=315420 False Guideline None None Network World - Magazine Info Doubts abound over US action on cybersecurity influence last year's election. Clearly, the government should be doing more on cybersecurity, said U.S. lawmakers and officials at the show, but they admit that politics and policy conflicts have hampered the government's approach.  “I wish the federal government could do this, but it's very hard, unfortunately, due to partisan politics,” said Virginia State Governor Terry McAuliffe, during a speech at the show. “They haven't been able to take the lead on this issue as they should have.”To read this article in full or to leave a comment, please click here]]> 2017-02-14T20:17:03+00:00 http://www.networkworld.com/article/3170188/security/doubts-abound-over-us-action-on-cybersecurity.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=313869 False Guideline None None Network World - Magazine Info IT and C-level leaders point fingers at each other over cyber defense To read this article in full or to leave a comment, please click here]]> 2017-02-09T11:18:00+00:00 http://www.networkworld.com/article/3168394/security/it-and-c-level-leaders-point-fingers-at-each-other-over-cyber-defense.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=310317 False Guideline None None Network World - Magazine Info NASA has a shadow IT problem shadow IT operation but a recent audit of NASA's IT realm came up with 28 unsanctioned cloud services operating in its environment. NASA's own CIO office found eight such services while the NASA Office of Inspector General discovered another 20, as part of an overall cloud security audit done by the NASA OIG. +More on Network World: NASA's “Human Computers” and the Hidden Figures movie story+To read this article in full or to leave a comment, please click here]]> 2017-02-08T08:38:00+00:00 http://www.networkworld.com/article/3167609/security/nasa-has-a-shadow-it-problem.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=309160 False Guideline None None Network World - Magazine Info US Immigration and Customs Enforcement nabs $20M in fake sports gear ahead of Super Bowl 51 10 of the latest craziest and scariest things the TSA found on your fellow travelers+170202opteamplayer1 ICE/DHS U.S. Immigration and Customs Enforcement (ICE) and Homeland Security Investigations (HSI) teams nabbed 260,000 counterfeit sports-related items during its annual, year-long Operation Team Player sting. Last year ICE seized nearly 450,000 phony items worth an estimated $39 million. In 2014 it grabbed 326,147 phony items worth more than $19.5 million.To read this article in full or to leave a comment, please click here]]> 2017-02-03T11:22:00+00:00 http://www.networkworld.com/article/3165400/security/us-immigration-and-customs-enforcement-nabs-20m-in-fake-sports-gear-ahead-of-super-bowl-51.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=306350 False Guideline None None Network World - Magazine Info Mobile security firm offers cash to hackers for their old exploits To read this article in full or to leave a comment, please click here]]> 2017-02-01T08:29:57+00:00 http://www.networkworld.com/article/3164287/security/mobile-security-firm-offers-cash-to-hackers-for-their-old-exploits.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=304161 False Guideline None None Network World - Magazine Info Are Apple-specific threats on the rise? To read this article in full or to leave a comment, please click here]]> 2017-02-01T05:34:00+00:00 http://www.networkworld.com/article/3164191/security/are-apple-specific-threats-on-the-rise.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=303895 False Guideline None None Network World - Magazine Info Trump to sign cybersecurity order calling for government-wide review To read this article in full or to leave a comment, please click here]]> 2017-01-31T09:02:31+00:00 http://www.networkworld.com/article/3163435/security/trump-to-sign-cybersecurity-order-calling-for-government-wide-review.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=303344 False Guideline None None Network World - Magazine Info Busted: Federal Reserve employee mined bitcoin using government server news release by the Office of Inspector General, Berthaume pleaded guilty to one count of unlawful conversion of government property.Working as a Communications Analyst, Berthaume had access to some Board computer servers. He put the computing power of a federal server to work for him. Mining is costly after all, as nowadays it tends to use more electricity than a miner earns. Unless a person has excess power from a solar farm for mining, then stealing electricity for mining is an option some people choose. You may have heard about the three men and one woman recently arrested in Venezuela for electricity theft and internet fraud.To read this article in full or to leave a comment, please click here]]> 2017-01-31T07:31:00+00:00 http://www.networkworld.com/article/3163431/security/busted-federal-reserve-employee-mined-bitcoin-using-government-server.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=303346 False Guideline None None Network World - Magazine Info SonicWall CEO talks of life after Dell spinout To read this article in full or to leave a comment, please click here]]> 2017-01-31T05:47:00+00:00 http://www.networkworld.com/article/3163425/security/sonicwall-ceo-talks-of-life-after-dell-spinout.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302938 False Guideline None None Network World - Magazine Info F5 Networks taps versatile Ciena higher-up to take over as CEO announced that Ciena SVP and COO Francois Locoh-Donou will succeed him on April 3.McAdam joined F5 in 2000 and served as CEO and President until July 2015, when he handed the reins to Manuel Rivelo. But Rivelo stepped down in December of that year for unspecified personal conduct issues, and McAdam jumped back into the fray at the Seattle company, which he has helped to build into an application delivery powerhouse generating about $2B in annual revenue.  To read this article in full or to leave a comment, please click here]]> 2017-01-30T14:07:00+00:00 http://www.networkworld.com/article/3163244/leadership-management/f5-networks-taps-versatile-ciena-higher-up-to-take-over-as-ceo.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=302440 False Guideline None None Network World - Magazine Info Trump, May agree to take on ISIS in cyberspace To read this article in full or to leave a comment, please click here]]> 2017-01-27T11:17:45+00:00 http://www.networkworld.com/article/3162061/government/trump-may-agree-to-take-on-isis-in-cyberspace.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=301680 False Guideline None None Network World - Magazine Info U.S. companies spending millions to satisfy Europe\'s GDPR says Jay Cline, PwC's U.S. privacy leader.Cline says PwC 'slatest survey showed that fear remains the biggest motivator for U.S. CIOs, who are “connecting the dots” after watching data breaches lead to lost revenues, regulatory fines and the erosion of consumer trust. “U.S. companies see the connection between doing privacy well and greater revenues and consumer trust,” says Cline, who surveyed 200 CIOs, CISOs and other C-suite executives.To read this article in full or to leave a comment, please click here]]> 2017-01-26T13:58:00+00:00 http://www.networkworld.com/article/3162105/security/article.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=300632 False Guideline None None Network World - Magazine Info IDG Contributor Network: Thales Data Threat Report: Security spending up, but so are breaches Thales' new Data Threat Report (pdf). Thales is a huge vendor that employs over 60,000 people across 56 countries. With multibillion euro revenue, it makes sense for the company to increase the perception that it is a thought leader in its field. And Thales' field is a big one. It is a systems integrator, equipment supplier and service provider in the aerospace, transport, defense and security markets. A major part of the company's offering lies around cybersecurity. This report is, therefore, very much in its wheelhouse.To read this article in full or to leave a comment, please click here]]> 2017-01-26T09:00:00+00:00 http://www.networkworld.com/article/3159597/security/thales-data-threat-report-security-spending-up-but-so-are-breaches.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=300649 False Guideline None None Network World - Magazine Info What to ask IDaaS vendors before you buy Gartner) included Okta, Microsoft and Centrify, with OneLogin, Ping Identity, SailPoint, Covisint, Salesforce, Lighthouse Security (IBM) and EMC/RSA figuring prominently as well. Although each company offers IDaaS, differences in feature sets and capabilities can make one solution preferable over the others for a particular organization.To read this article in full or to leave a comment, please click here]]> 2017-01-25T10:02:00+00:00 http://www.networkworld.com/article/3161707/security/10-questions-to-ask-idaas-vendors-before-you-buy.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=299964 False Guideline None None Network World - Magazine Info Kaspersky Lab employee reportedly arrested in Russia on treason charges According to Russian newspaper Kommersant, Ruslan Stoyanov, the head of the computer incidents investigation team at Kaspersky, was arrested in December as part of an investigation that also targeted Sergei Mikhailov, the deputy head of the Information Security Center at the FSB, Russia's internal security service. Russian authorities are investigating Mikhailov in connection to the receipt of money from a foreign organization, an unnamed source close to the FSB reportedly told the newspaper.To read this article in full or to leave a comment, please click here]]> 2017-01-25T07:10:20+00:00 http://www.networkworld.com/article/3161178/security/kaspersky-lab-employee-reportedly-arrested-in-russia-on-treason-charges.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=299967 False Guideline None None Network World - Magazine Info Google pushed developers to fix security flaws in 275,000 Android apps To read this article in full or to leave a comment, please click here]]> 2017-01-20T07:51:38+00:00 http://www.networkworld.com/article/3159967/security/google-pushed-developers-to-fix-security-flaws-in-275000-android-apps.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=296689 False Guideline None None Network World - Magazine Info How to wake the enterprise from IoT security nightmares Marketsandmarkets.com analyst report. Where the cyber security mayhem grows, so flows the security market money. In 2017, experts predict that gaping IoT security holes will lead to the destruction of critical infrastructure and increases in competitive intelligence gathering and intellectual property theft. 2017 will see more DDoS attacks of the magnitude that brought down the Dyn Domain Name System service and many high-profile web domains with it.To read this article in full or to leave a comment, please click here]]> 2017-01-20T05:14:00+00:00 http://www.networkworld.com/article/3159711/internet-of-things/how-to-wake-the-enterprise-from-iot-security-nightmares.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=296383 False Guideline None None Network World - Magazine Info Air Force goes after cyber deception technology Prattle system for the Air Force. Galios describes Prattle as a system that generates traffic that misleads an attacker that has penetrated a network: making them doubt what they have learned, or to cause them to make mistakes that increase their likelihood of being detected sooner.To read this article in full or to leave a comment, please click here]]> 2017-01-19T12:38:00+00:00 http://www.networkworld.com/article/3159704/security/air-force-goes-after-cyber-deception-technology.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=295416 False Guideline None None Network World - Magazine Info How to get fired in 2017: Have a security breach survey released this morning.For example, having a tech investment that leads to a security breach was considered a fireable offense by 39 percent of organizations, according to Osterman Research, which conducted the survey.A data breach that becomes public was a fireable offense for 38 percent of companies.Other fireable offenses included failing to modernize a security program, data breaches with unknown causes, data breaches that do not become public, and the failure of a security product or program investment.To read this article in full or to leave a comment, please click here]]> 2017-01-18T10:17:00+00:00 http://www.networkworld.com/article/3158907/security/how-to-get-fired-in-2017-have-a-security-breach.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=294608 False Guideline None None Network World - Magazine Info The war for cybersecurity talent hits the Hill Computerworld's Facebook page.]"I agree 110% that we need to strengthen the workforce" of cybersecurity professionals, McCaul said during a meeting with reporters at the National Press Club.To read this article in full or to leave a comment, please click here]]> 2017-01-17T07:03:00+00:00 http://www.networkworld.com/article/3158472/security/the-war-for-cybersecurity-talent-hits-the-hill.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=293882 False Guideline None None Network World - Magazine Info Rudy Giuliani to coordinate regular cybersecurity meetings between Trump, tech leaders Fox and Friends.To read this article in full or to leave a comment, please click here]]> 2017-01-12T08:46:00+00:00 http://www.networkworld.com/article/3157368/security/rudy-giuliani-to-coordinate-regular-cybersecurity-meetings-between-trump-tech-leaders.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=291045 False Guideline None None Network World - Magazine Info IDG Contributor Network: Nyotron launches to \'secure the world.\' Simple, eh? Nyotron today launched its cybersecurity product in the U.S. Nothing too exciting about that, but the history of the company's founder might pique your interest.Nir Gaist is the sort of over-achiever that one either worries hugely about or admires greatly (or probably both in equal measure). Nyotron's CEO and founder, Gaist started programing at the age of six. (Which leads me to ask, what took him so long?) In 2008, he and his brother Ofer Gaist, now COO, started Nyotron as a penetration testing company. Before founding the company, and as a departure from his buddies who were probably playing Candy Crush or something, Nir hacked an Israeli service provider, which was so impressed with his skills it ended up hiring him. From there, he went on to test telephone systems, online banking protocols, ATMs and more for the largest banks in Israel. To read this article in full or to leave a comment, please click here]]> 2017-01-12T06:00:00+00:00 http://www.networkworld.com/article/3155381/security/nyotron-launches-to-secure-the-world-simple-eh.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=291048 False Guideline None None Network World - Magazine Info Adobe patches critical flaws in Flash Player, Reader and Acrobat fixes 13 vulnerabilities, 12 that can lead to remote code execution and one that allows attackers to bypass a security restriction and disclose information. Adobe is not aware of any exploit for these flaws existing in the wild.Users are advised to upgrade to Flash Player version 24.0.0.194 on Windows, Mac and Linux. The Flash Player plug-in bundled with Google Chrome, Microsoft Edge and Internet Explorer will be automatically upgraded through those browsers' respective update mechanisms.To read this article in full or to leave a comment, please click here]]> 2017-01-10T14:22:52+00:00 http://www.networkworld.com/article/3156584/security/adobe-patches-critical-flaws-in-flash-player-reader-and-acrobat.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=289257 False Guideline None None Network World - Magazine Info Microsoft releases one of its smallest monthly security patch bundles the one for Microsoft Office and Office Services and Web Apps. It covers a memory corruption vulnerability that can be exploited by tricking users to open specially crafted files and can lead to remote code execution.To read this article in full or to leave a comment, please click here]]> 2017-01-10T12:53:10+00:00 http://www.networkworld.com/article/3156035/security/microsoft-releases-one-of-its-smallest-monthly-security-patch-bundles.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=289259 False Guideline None None Network World - Magazine Info Trump mum on Russia blame after US intelligence briefing To read this article in full or to leave a comment, please click here]]> 2017-01-06T12:54:06+00:00 http://www.networkworld.com/article/3155282/security/trump-mum-on-russia-blame-after-us-intelligence-briefing.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=287133 False Guideline None None Network World - Magazine Info 2017: The year of cybersecurity scale To read this article in full or to leave a comment, please click here]]> 2017-01-05T08:34:00+00:00 http://www.networkworld.com/article/3154813/security/2017-the-year-of-cybersecurity-scale.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=286386 False Guideline None None Network World - Magazine Info Ransomware took in $1 billion in 2016--improved defenses may not be enough to stem the tide phishing threats, better antivirus technology, more industry-wide information sharing and cross-border efforts by law enforcement authorities will combine to turn the tide against ransomware this year, according to some security experts, but others expect the attacks to continue to increase.According to a security expert who requested anonymity, ransomware cybercriminals took in about $1 billion last year, based on money coming into ransomware-related Bitcoin wallets.That includes more than $50 million each for three wallets associated with the Locky ransomware, and a fourth one that processed close to $70 million. Cryptowall brought in close to $100 million before it was shut down this year. CryptXXX gathered in $73 million during the second half of 2016, and Cerber took in $54 million, the expert said.To read this article in full or to leave a comment, please click here]]> 2017-01-05T04:43:00+00:00 http://www.networkworld.com/article/3154832/security/ransomware-took-in-1-billion-in-2016-improved-defenses-may-not-be-enough-to-stem-the-tide.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=285997 False Guideline None None Network World - Magazine Info Tech outages of 2016 and how to prevent them in 2017 Image by Thinkstock2016 has seen major downtime events lead to lost revenue for a number of highly-recognizable brands and caused a severe knock to their reputation and consumer confidence. One of the most common causes of outages is unplanned configuration changes to a system, often when an immediate fix for a bug or potential system vulnerability unintentionally creates a much larger problem.To read this article in full or to leave a comment, please click here]]> 2016-12-30T04:37:00+00:00 http://www.networkworld.com/article/3153723/security/tech-outages-of-2016-and-how-to-prevent-them-in-2017.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=282841 False Guideline None None Network World - Magazine Info 5 signs we\'re finally getting our act together on security ransomware has surged in the last year. Although that kind of malware has been around for years, the current model of encrypting user files to hold data hostage came about just recently. Infections quadrupled in 2016, with the FBI estimating an average of 4,000 attacks a day. A recent IBM survey of 600 business leaders in the United States found that one in two had experienced a ransomware attack in the workplace, and that companies paid the ransom 70 percent of the time. As a result, criminals are on track to make nearly $1 billion this year from ransomware, IBM X-Force said.To read this article in full or to leave a comment, please click here]]> 2016-12-29T04:36:00+00:00 http://www.networkworld.com/article/3153620/security/5-signs-were-finally-getting-our-act-together-on-security.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=281637 False Guideline None None Network World - Magazine Info Corporate boards aren\'t prepared for cyberattacks Yahoo announced the largest-ever data breach, involving more than 1 billion customer accounts.Despite the scale and potential harm from such attacks, there's wide recognition that corporate leaders, especially boards of directors, aren't taking the necessary actions to defend their companies against such attacks. It's not just a problem of finding the right cyber-defense tools and services, but also one of management awareness and security acumen at the highest level, namely corporate boards.To read this article in full or to leave a comment, please click here]]> 2016-12-26T04:51:00+00:00 http://www.networkworld.com/article/3153409/security/corporate-boards-arent-prepared-for-cyberattacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=279728 False Guideline Yahoo None Network World - Magazine Info Senators call for special committee to investigate Russian election hacking urged Majority Leader Mitch McConnell not to allow an investigation into Russian interference of the election to become a partisan issue. It's an issue which “should alarm every American.”That same day, President-elect Donald Trump blew off the idea that the intelligence community had a clue as to whom was behind the hacks. His transition team later added, “These are the same people that said Saddam Hussein had weapons of mass destruction.”To read this article in full or to leave a comment, please click here]]> 2016-12-19T07:44:00+00:00 http://www.networkworld.com/article/3151537/security/senators-call-for-special-committee-to-investigate-russian-election-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=276461 False Guideline None None Network World - Magazine Info Citrix is building your workspace of the future the blind men and the elephant. How customers describe the company depends a lot on which of Citrix's diverse products they touch. It's a desktop and app virtualization company. It's a networking company. A secure file sharing company, a mobility management firm. Yes, Citrix is all of those and more, and CEO Kirill Tatarinov – one year after taking over from long-time leader Mark Templeton – is working to show how all those pieces play together in making Citrix the focal point of the 'workspace of the future' for nimble enterprises. To read this article in full or to leave a comment, please click here]]> 2016-12-15T06:46:00+00:00 http://www.networkworld.com/article/3150984/virtualization/citrix-is-building-your-workspace-of-the-future.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=274382 False Guideline None None Network World - Magazine Info Trump, tech leaders avoided encryption and surveillance talk at summit To read this article in full or to leave a comment, please click here]]> 2016-12-15T05:40:00+00:00 http://www.networkworld.com/article/3150682/techology-business/trump-tech-leaders-avoided-encryption-and-surveillance-talk-at-summit.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=274116 False Guideline None None Network World - Magazine Info 10 game changing networking acquisitions of 2016 Image by ThinkstockIn the networking industry, it seems that every year there's a flurry of mergers and acquisitions. Turns out that 2016 was no different. Here are 10 that have the most game changing potential, since they have the potential to move the acquiring company into an entirely new market.To read this article in full or to leave a comment, please click here]]> 2016-12-14T12:39:00+00:00 http://www.networkworld.com/article/3150132/leadership-management/10-game-changing-networking-acquisitions-of-2016.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=273031 False Guideline None None Network World - Magazine Info Tech Forecast 2017: 5 key technologies to double down on now digital transformation dominating the business agenda, IT pros are under pressure to create a modern-day tech foundation sturdy enough to drive that change as they head into 2017. What milestones are they aiming for in the year ahead? Where should they direct their limited resources?According to Computerworld's Forecast 2017 survey, IT professionals will prioritize security, analytics, XaaS or "as a service" technology, virtualization and mobile apps in the coming year. If you're thinking of adding those technologies to your own 2017 to-do list, read on for findings from our survey, along with real-world advice from other IT leaders.To read this article in full or to leave a comment, please click here]]> 2016-12-14T05:35:00+00:00 http://www.networkworld.com/article/3150444/leadership-management/tech-forecast-2017-5-key-technologies-to-double-down-on-now.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=272672 False Guideline None None Network World - Magazine Info 5 core topics Trump needs to address in Silicon Valley leaders meeting To read this article in full or to leave a comment, please click here]]> 2016-12-12T14:08:00+00:00 http://www.networkworld.com/article/3149563/security/5-core-topics-trump-needs-to-address-in-silicon-valley-leaders-meeting.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270894 False Guideline None None Network World - Magazine Info Politics bog down US response to election hacks influence this year's election. Among the targets were Democratic groups and figures whose emails were stolen and later leaked online.To read this article in full or to leave a comment, please click here]]> 2016-12-12T13:33:51+00:00 http://www.networkworld.com/article/3148881/security/politics-bog-down-us-response-to-election-hacks.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270895 False Guideline None None Network World - Magazine Info Survey: Despite costly attacks, 85% of business leaders confident in preparedness survey sponsored by BAE Systems.Why the disconnect?[Related: 3 ingredients of a successful attack] It's one thing to believe you have the right protections in place; it's another thing to test those beliefs. The survey of 600 business leaders across five countries found that “only 29% of organizations tested their attack response in the last month. On average, organizations last tested their cyber attack response 5 months ago.”To read this article in full or to leave a comment, please click here]]> 2016-12-12T10:22:00+00:00 http://www.networkworld.com/article/3149587/malware-cybercrime/survey-despite-costly-attacks-85-of-business-leaders-confident-in-preparedness.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270909 False Guideline None None Network World - Magazine Info Tech predictions for 2017: What I expect to happen, and what I hope will happen predictions made a year ago and admitting what came true and what didn't. So let's get into that. How good were my 2016 predictions? 1. IBM becomes a major cloud player.Not really. The most recent numbers, which covered Q2 of this year, put IBM at under 10 percent share. It's still an Amazon and Microsoft world. The good news is IBM grew 57 percent year over year, so it is making up for lost ground. To read this article in full or to leave a comment, please click here]]> 2016-12-12T05:53:00+00:00 http://www.networkworld.com/article/3148850/cloud-computing/tech-predictions-for-2017-what-i-expect-to-happen-and-what-i-hope-will-happen.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270550 False Guideline None None Network World - Magazine Info Why CISOs succeed and why they leave Information Systems Security Association (ISSA) published a research report titled, The State of Cyber Security Careers. The report was based on a survey of 437 cybersecurity professionals, the clear majority of which were ISSA members.Two-thirds of these cybersecurity professionals worked at an organization that employed a CSO or CISO. These individuals were then asked to identify the most important qualities that make a successful CISO. Here is a sample of the results: 50% of respondents said strong leadership skills were most important 47% of respondents said strong communication skills were most important 30% of respondents said a strong relationship with business executives was most important 29% of respondents said a strong relationship with the CIO and other members of the IT leadership team was most important 23% of respondents said strong management skills were most important Based upon this list, it's clear that successful CISOs need to be strong business people who can work with business and IT executives. This is an important consideration since many security professionals are deeply rooted in the technology rather than the business aspects of infosec.To read this article in full or to leave a comment, please click here]]> 2016-12-09T11:05:00+00:00 http://www.networkworld.com/article/3149075/security/why-ciso-succeed-and-why-they-leave.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=270098 False Guideline None None Network World - Magazine Info Playing cyber defense is not enough to win To read this article in full or to leave a comment, please click here]]> 2016-12-07T05:37:00+00:00 http://www.networkworld.com/article/3147833/security/playing-cyber-defense-is-not-enough-to-win.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=268049 False Guideline None None Network World - Magazine Info Getting started with blockchain smart contracts Blockchain: You've got questions; we've got answers ]What are smart contracts? Early approaches to smart contracts included some that were merely “augmented by technology,” says Houman B. Shadab, professor of law at New York Law School. “In a sense, you could view contract signing and management services like DocuSign as an example of [smart contracts].” Other approaches automated the production of traditional contracts using templates.To read this article in full or to leave a comment, please click here]]> 2016-12-06T10:27:00+00:00 http://www.networkworld.com/article/3147734/leadership-management/getting-started-with-blockchain-smart-contracts.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=267603 False Guideline None None Network World - Magazine Info Trump Cybersecurity Do\'s and Don\'ts (Part 2) blog, I presented some recommendations for the “do” column.  Alternatively, here is a list of things President Trump should eschew in his administration's cybersecurity agenda.  The “don't” column includes the following: Don't obsess over cybersecurity intelligence sharing path.  Public/private partnerships for cybersecurity cooperation have roots that go back to the Clinton administration's original PDD-63 for critical infrastructure protection.  In more recent times, congress struggled with CISPA then CISA as stand-alone bills before sneaking CISA into a federal spending bill in late 2015.  Intelligence sharing is a good step but it's been beaten to death and most large organizations have figured this out on their own.  What's needed is a concerted effort on best practices and sharing threat intelligence with small businesses.  Yes, these things should happen but the feds should do so as part of CISA and not spin up another distracting effort.  Remember that threat intelligence sharing is a means to an end (i.e. better cybersecurity visibility and analysis) and not an end in itself. Don't propose yet another blue-ribbon cybersecurity panel.  If Mr. Trump's goal is to shake up Washington, the last thing he should do is appoint another blue-ribbon panel to study cybersecurity issues and provide recommendations – this action is on page one of every Beltway politician's playbook.  As an alternative, Mr. Trump should appoint high-level cybersecurity experts to go through President Obama's cybersecurity commission's findings and suggestions (as well as other historical similar reports), tailor them to his political agenda, and push forward the appropriate actions with congress as soon as possible.     Don't even think about giving national cybersecurity oversight to the military.  The few cybersecurity plans Mr. Trump camp talks about tend to include a military and intelligence component to them.  This is fine when it comes to offensive operations and U.S. Cyber Command but it gets a little scary with regard to civilian agencies and the private sector.  There are those at the Pentagon that will push for this by equating cybersecurity with national security but with all due respect to the military, Mr. Trump must absolutely follow the lead of past President's and draw a clear line between military and civilian cybersecurity involvement.  In truth, ANY military, law enforcement, or intelligence involvement in private sector and consumer cybersecurity programs will turn into an all-consuming political and technology civil war with Republicans and Democrats alike will pushing back.   This unnecessary fight must be avoided as it could halt federal cybersecurity progress for months or years.  Don't push for a new federal cybersecurity agency.  Since the military can't be involved in private sector cybersecurity, many responsibilities fall to DHS, a massive bureaucracy that hasn't had a strong record of success with its cybersecurity programs.  Some in Washington see this as a reason to create yet another civilian agency, a department of national cybersecurity.  While it may be tempting to consolidate cybersecurity responsibilities, it would be extremely difficult to unwind cybersecurity from DHS and every other nook and cranny in the greater DC area.  This shouldn't mean however that the]]> 2016-12-06T06:56:00+00:00 http://www.networkworld.com/article/3147645/security/trump-cybersecurity-do-s-and-don-ts-part-2.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=267481 False Guideline None None Network World - Magazine Info Expedia IT tech made $330K by secretly accessing execs\' files for insider trading called, “Particularly egregious because Mr. Ly abused his special access privileges as an IT administrator. On top of violating the trust of the public and his company, he violated the privacy of fellow employees by surreptitiously accessing their files.”To read this article in full or to leave a comment, please click here]]> 2016-12-06T05:59:00+00:00 http://www.networkworld.com/article/3147350/security/expedia-it-tech-made-330k-by-secretly-accessing-execs-files-for-insider-trading.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=267482 False Guideline None None Network World - Magazine Info Security pros most worried about clouds, mobile survey of cybersecurity professionals released this morning.Around 60 percent of companies were able to assess security risks in cloud environments, down 7 points compared to last year. Mobile devices scored at 57 percent, down by 8 percentage points compared to last year.Overall, the confidence levels of security professionals that their cyber defenses were meeting expectations dropped from 76 percent last year to 70 percent in this year's survey, according to the report, which was produced by Annapolis, M.D.-based CyberEdge Group, and sponsored by Tenable.To read this article in full or to leave a comment, please click here]]> 2016-12-05T07:01:00+00:00 http://www.networkworld.com/article/3146823/leadership-management/security-pros-most-worried-about-clouds-mobile.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=266853 False Guideline None None Network World - Magazine Info Who\'s responsible for data compliance? 25% of executives don\'t know Liaison Technologies, one-quarter of top executives are unclear who in their organization is responsible for compliance. And nearly half (47 percent) of respondents to the survey of 479 senior and C-level executives said they don't know which compliance standards apply to their organizations.“As leaders in the compliance domain we thought it was important to share our findings on how U.S. companies perceive their regulatory obligations-and examine ways to help improve their compliance postures,” Hmong Vang, chief trust officer with Liaison, said in a statement. “What we found was rather concerning."To read this article in full or to leave a comment, please click here]]> 2016-12-01T10:43:00+00:00 http://www.networkworld.com/article/3145663/compliance/whos-responsible-for-data-compliance-25-of-executives-dont-know.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=264813 False Guideline None None Network World - Magazine Info Scholars, infosec experts call for action on Russian hacking signed an open letter calling for a congressional investigation."Our country needs a thorough, public Congressional investigation into the role that foreign powers played in the months leading up to November," the letter said.Democrats in Congress have also called for an investigation, and were recently joined by Republican Sen. Lindsey Graham.To read this article in full or to leave a comment, please click here]]> 2016-12-01T05:14:00+00:00 http://www.networkworld.com/article/3146527/security/scholars-infosec-experts-call-for-action-on-russian-hacking.html#tk.rss_security www.secnews.physaphae.fr/article.php?IdArticle=264475 False Guideline None None