Let that vulnerability sit for a bitImage by ThinkstockThe word “vulnerability” typically comes with a “must fix now” response. However, not all vulnerabilities should be treated equally because not all of them pose a risk. It all depends on what the data represents. In fact, some vulnerabilities are OK to deprioritize, depending on associated threats and the value of the asset at risk. For example, a lock on a 20th floor window of a building is not as important as one on the ground level, unless the contents of the room are so valuable that a thief would take the effort to access such an unreachable place. Scans reveal thousands of vulnerabilities across all assets – networks, applications, systems and devices – but they do not show which ones could lead to a damaging compromise if not fixed immediately. It is not about ignoring vulnerabilities; it is about prioritizing how you apply your resources to remediate them. Bay Dynamics provides some examples of vulnerabilities that are OK to put on the back burner.To read this article in full or to leave a comment, please click here
With college graduations now behind students, many young people might already have secured jobs even before they crossed the stage with their degrees in hand. With these fresh-faced employees on the payroll, now businesses must make sure their security habits are in line with today’s policies.To read this article in full or to leave a comment, please click here(Insider Story)
With college graduations now behind students, many young people might already have secured jobs even before they crossed the stage with their degrees in hand. With these fresh-faced employees on the payroll, now businesses must make sure their security habits are in line with today’s policies.New graduates aren’t just bringing their skills and experience to the workplace – they’re also bringing poor cybersecurity habits. Recent studies have shown Millennials are generally indifferent about data security, says David Meyer of OneLogin, an identity access management company.With many new grads choosing to use applications and devices that have not been approved by corporate IT, there is no easy way to monitor usage to ensure data remains secure. Considering the average cost of a cyber breach is approximately $3.8 million, it’s in a company’s best interest to exercise precaution as they welcome entry-level employees into the ranks, he says.To read this article in full or to leave a comment, please click here(Insider Story)
New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.IntellaFlex HyperEngine Packet ProcessorKey features – APCON’s HyperEngine monitoring solution supports up to 200Gbps throughput and provides a set of monitoring services including ultra-fast deduplication and NetFlow at hyperspeed, with additional features coming later in 2016. More info.To read this article in full or to leave a comment, please click here
New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.IntellaFlex HyperEngine Packet ProcessorKey features – APCON’s HyperEngine monitoring solution supports up to 200Gbps throughput and provides a set of monitoring services including ultra-fast deduplication and NetFlow at hyperspeed, with additional features coming later in 2016. More info.To read this article in full or to leave a comment, please click here
Pulling ransomware out of …Image by ThinkstockRansomware quite often targets businesses (for example hospitals) rather than individuals. Corporations have more valuable data and more money for ransom (ransom increases from roughly $500 per computer to $15,000 for the entire enterprise). Cyphort has examined different variants of ransomware to help users get an idea of what might be coming down the Internet pipeline. So keep an eye out for these characteristics before your network is taken hostage.To read this article in full or to leave a comment, please click here
Pulling ransomware out of …Image by ThinkstockRansomware quite often targets businesses (for example hospitals) rather than individuals. Corporations have more valuable data and more money for ransom (ransom increases from roughly $500 per computer to $15,000 for the entire enterprise). Cyphort has examined different variants of ransomware to help users get an idea of what might be coming down the Internet pipeline. So keep an eye out for these characteristics before your network is taken hostage.To read this article in full or to leave a comment, please click here
New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Actiance Platform for the healthcare and pharmaceutical industriesKey features: The Actiance Platform addresses communications challenges for healthcare and pharmaceutical organizations in the midst of changing regulations by ensuring companies meet industry-specific data retention and security requirements. With the Actiance Platform for the healthcare and pharmaceutical industries, organizations can embrace new communications channels while protecting data and ensuring compliance. More info.To read this article in full or to leave a comment, please click here
New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Actiance Platform for the healthcare and pharmaceutical industriesKey features: The Actiance Platform addresses communications challenges for healthcare and pharmaceutical organizations in the midst of changing regulations by ensuring companies meet industry-specific data retention and security requirements. With the Actiance Platform for the healthcare and pharmaceutical industries, organizations can embrace new communications channels while protecting data and ensuring compliance. More info.To read this article in full or to leave a comment, please click here
Impersonating appsEnterprise employees use mobile apps every day to get their jobs done, but when malicious actors start impersonating those apps, it spells trouble for IT departments. David Richardson, director of product at Lookout, and his team recently researched five families of malware doing just that: spoofing real enterprise apps to lure people to download their malware. The dataset of mobile code shows that these five, active mobile malware families often impersonate enterprise apps by ripping off the legitimate app’s name and package name. These apps include Cisco’s Business Class Email app, ADP, Dropbox, FedEx Mobile, Zendesk, VMware’s Horizon Client, Blackboard’s Mobile Learn app, and others.To read this article in full or to leave a comment, please click here
Impersonating appsEnterprise employees use mobile apps every day to get their jobs done, but when malicious actors start impersonating those apps, it spells trouble for IT departments. David Richardson, director of product at Lookout, and his team recently researched five families of malware doing just that: spoofing real enterprise apps to lure people to download their malware. The dataset of mobile code shows that these five, active mobile malware families often impersonate enterprise apps by ripping off the legitimate app’s name and package name. These apps include Cisco’s Business Class Email app, ADP, Dropbox, FedEx Mobile, Zendesk, VMware’s Horizon Client, Blackboard’s Mobile Learn app, and others.To read this article in full or to leave a comment, please click here
Keep the network out of reach of criminalsImage by Susana FernandezAccording to the Verizon data breach investigation report published last month, phishing remains a major data breach weapon of choice. Trend Micro added that ransomware is expected to be one of the biggest threats in 2016 and that a single ransom demand will go much higher, reaching seven figures.To read this article in full or to leave a comment, please click here
Keep the network out of reach of criminalsImage by Susana FernandezAccording to the Verizon data breach investigation report published last month, phishing remains a major data breach weapon of choice. Trend Micro added that ransomware is expected to be one of the biggest threats in 2016 and that a single ransom demand will go much higher, reaching seven figures.To read this article in full or to leave a comment, please click here
New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Zuznow “Red Fox” versionKey features: A frontend-as-a-Service (FaaS) platform, the new Zuznow “Red Fox” version automatically creates and maintains web and native apps for smartphones, tablets, desktops and laptops. Enterprises can build and deploy premium mobile apps in minutes – without coding – through a simple, three-step configuration wizard. More info.To read this article in full or to leave a comment, please click here
New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Zuznow “Red Fox” versionKey features: A frontend-as-a-Service (FaaS) platform, the new Zuznow “Red Fox” version automatically creates and maintains web and native apps for smartphones, tablets, desktops and laptops. Enterprises can build and deploy premium mobile apps in minutes – without coding – through a simple, three-step configuration wizard. More info.To read this article in full or to leave a comment, please click here
Keep ‘em aroundImage by MilitaryHealthWith the growing number of threats, it's vital for companies to hire — and retain — the best and brightest IT security employees. But, with IT hiring above the national average of 44 percent and the average employee tenure in the IT industry only being three years, employers need to explore new ways to not only attract talent, but avoid burnout and keep that coveted talent around.To read this article in full or to leave a comment, please click here(Insider Story)
Game onImage by thinkstockData breaches continue to grow in number, size, severity and cost. With the increase in new security holes, vulnerabilities and attack vectors that need to be fixed, many businesses are turning to gamification to help employees adhere to cybersecurity best practices.To read this article in full or to leave a comment, please click here
Game onImage by thinkstockData breaches continue to grow in number, size, severity and cost. With the increase in new security holes, vulnerabilities and attack vectors that need to be fixed, many businesses are turning to gamification to help employees adhere to cybersecurity best practices.To read this article in full or to leave a comment, please click here
New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Appian Quick AppsKey features: Appian Quick Apps enables citizen developers without technical knowledge to create fully-functional business application in 15 minutes or less. Apps are automatically supported on leading devices, desktop web browsers and mobile devices. More info.To read this article in full or to leave a comment, please click here