Friday, February 17, 2012

First look: Norton's 2012 desktop, smartphone security push

13 security myths | Crypto experts analyze millions of X.509 certificates, call RSA crypto flawed

Network World Compliance

Forward this to a Friend >>>


First look: Norton's 2012 desktop, smartphone security push
Norton today released an updated version of its Norton 360 desktop and mobile security software, while also rolling out a new licensing arrangement for combined PC, Mac and Android use. Read More


WHITE PAPER: PC Mall

Networking and Cloud: An Era of Change
As you deploy cloud infrastructure and operating models in your organization, the role that networking plays and the impact of these models on your networks may not always be clear. This document discusses the importance of the network to cloud computing, why the network must change, and what Cisco is doing to lead these changes. Learn More!

WHITE PAPER: Webroot

How to Protect Your Business from the Coming Malware Storm
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service. Read More Today!

13 security myths
Security experts hammer on security ideas they say are just "myths" Read More

Crypto experts analyze millions of X.509 certificates, call RSA crypto flawed
Cryptography researchers collected millions of X.509 public-key certificates that are publicly available over the web and found what they say is a shockingly high frequency of duplicate RSA-moduli keys. Read More

Netflix settles privacy-violations lawsuit for $9 million
Video service Netflix has disclosed it paid out $9 million last year to settle a class-action lawsuit that it violated privacy by keeping records on what subscribers watched two years after customers had canceled their plans. Read More


WEBCAST: VMware

Automating Infrastructure and Operations Management
Attend this webcast to learn how the new VMware vCenter™ Operations Management Suite allows IT to: - Dramatically simplify services - Automate service delivery and management View Now!

Romanian police arrest alleged hacker in Pentagon, NASA breaches
Razvan Manole Cernaianu is accused of revealing security holes and publishing information about SQL injection vulnerabilities in those agencies. Read More

Nortel executives knew of data breach, chose to do nothing
The data breach into Nortel's data systems was known to company executives, including the CEO, for over a decade, but the company refused to take steps to prevent data loss. Read More

Startup Porticor launches with encryption technology for cloud computing
Israel-based startup Porticor launches this week with technology aimed at giving enterprises a way to encrypt data held in cloud computing services, including those from Amazon and Rackspace. Read More


WHITE PAPER: NetIQ

Streamline Compliance and Increase ROI
Streamline, simplify, and automate compliance related activities; especially those that impact multiple business units. This white paper from NetIQ, outlines solutions that will help your business gain the maximum return on investment possible while aligning your compliance programs. Learn More!

Startup with heavy Russian connections offers crypto authentication service
Can a security startup based in Bedford, N.H., which relies on Russian cryptography expertise from Moscow, bring about a revolution in the way that users authenticate to gain access to websites today and secure data? Read More

Four keys to successful BYOD
The bring your own device (BYOD) movement formally advocates use of personal equipment for work and obligates IT to ensure jobs can be performed with an acceptable level of security, but how can risks be addressed given the range of devices used and the fact that you lack control of the end point? Read More

H.R. 1981, the jaws of law will eat your Internet rights
Like the great white in Jaws there's proposed legislation about to strike and it's your liberties that will have a chunk missing Read More

Slideshow: 15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one? For some perspective, we take a look at 15 of the biggest incidents in recent memory. Read More



SLIDESHOWS

Firefox faceoff: Nightly vs. Pale Moon vs. Waterfox
Three unofficial Firefox variants take advantage of 64-bit processors and 64-bit version of Windows 7.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPad 3 rumor rollup for the week of Feb. 14
  2. iPad 3: Should it support LTE?
  3. ENIAC, world's first digital computer, turns 66
  4. EFF promises new fight against software patent abuse, but ....
  5. 13 security myths you'll hear -- but should you believe?
  6. Forget about public or private cloud, it's all about hyper-hybrid
  7. One more take on the iPad of the future: the MacPad Pro
  8. U.S. cyber counterattack: Bomb 'em one way or the other
  9. Cisco study finds The Who was right
  10. Cisco loses its smart grid head

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: