Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

More Security Breaches: Denial Not An Option!

It has happened again. Another breach. Another report of millions of credit card numbers at risk. Another round of media coverage. Another reminder that despite all the sophisticated technology that enterprises have deployed to protect computer networks, these breaches still happen. But despite the negative publicity that comes from continuing reports of such breaches, the need to be vigilant about thwarting such attacks remains, says Steve Durbin, global vice president of the Information Security Forum (ISF).

“It’s big business, big money and cybercriminals tend to follow the money,” says Durbin, whose organization recently released a report, “Threat Horizon 2014: Managing Risks When Threats Collide,” that warns of the increasing sophistication of cyberattacks to spread malware and break into networks to steal data and money.

The latest breach was reported Friday when Visa and MasterCard acknowledged that the computer network of a third-party payment card processor had been breached. Various news reports identified the target as Global Payments, of Atlanta. While estimates of the number of credit card accounts exposed ranged from 1 million to 3 million to as many as 10 million, there’s no evidence yet that any fraud has occurred.

Still, this event underscores the point the ISF makes in its Threat Horizon report that “the range and complexity of information security threats is set to rise significantly over the next two years.”

The report looks at three broad areas of security: external threats from cybercriminals; regulatory threats, such as laws requiring greater transparency and disclosure of breaches, as well as stricter data privacy protection; and internal threats from new technology introduced onto data networks without proper security vetting, such as the “bring your own device” (BYOD) trend.

The ISF, a global not-for-profit organization based in the UK that shares research and other advice on security best practices with organizations, warns in its report that cybercriminals are getting more sophisticated in their attacks and that different groups of cybercriminals are learning from each other. For instance, says Durbin, there have been cases in which organized criminals have adopted techniques developed by online activists, such as the group Anonymous, which has launched distributed denial of service (DDoS) attacks on Web sites to make a political point.

In addition, the distribution of malware has exploded, Durbin says, referring to the places on the Internet and other networks from which malware is disseminated as “malspace”. Also on the rise is the distribution of malware on mobile devices, such as the recent case in which several apps on the Google Android Market were found to be tools to distribute malware.


Page:  1 | 2  | Next Page »


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013



TechWeb Careers