Friday, October 05, 2012

Who holds IT security power?

  Whitelisting pushing out antivirus at some security-minded retailers | Products of the week 10.1.12
 
  Network World Compliance

Forward this to a Friend >>>


Who holds IT security power?
From Apple, to Symantec and Anonymous, lots of people, companies and groups influence the IT security world Read More


WEBCAST: Teradata

Big Data Done Right
View this on-demand webcast to learn how to reap the benefits of big data through a practical unified architecture; how to improve performance with in-memory technology; and how to lower costs and increase scalability through cloud computing. Register now.

WHITE PAPER: Blue Coat Systems

Optimize and Secure Cloud, SaaS, BYOD, and Social Media
Today's threat landscape has migrated to the web causing many security professionals to prevent direct Internet access at the branch. But with new cloud-based security solutions from Blue Coat you can re-architect your network to embrace the Internet – safely – and optimize application performance. Learn more.

Whitelisting pushing out antivirus at some security-minded retailers
The influential Payment Card Industry (PCI) rules call for use of antivirus software to protect debit and credit cards, but some retailers have found a substitute that's been accepted in place of it: whitelisting technology. Read More

Products of the week 10.1.12
Our roundup of intriguing new products from companies such as SAP,Hitachi, Extreme Read More

Apple honors Steve Jobs on anniversary of his death
Apple's homepage this morning is devoted to a video tribute to Steve Jobs, who passed away a year ago today. The two-minute video, which you can watch here, features a montage of the man's most famous quotes and photographs. There's also a written message from Apple CEO Tim Cook, which you see below along with a couple of screen captures. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

LogMeIn Rescue: Remote Support for PCs and mobile devices.
Rescue lets you remotely connect, troubleshoot and repair PCs and todays' most popular smartphones. With Rescue, IT can instantly connect, diagnose and solve. This enables IT to do more, and spend time on the tough IT cases. Do more and improve customer satisfaction and outcomes. Find out what IT knows. Do More. Try Rescue today

Flame fallout: Microsoft encryption deadline looms Tuesday
Starting Tuesday Microsoft platforms will block the use of encryption keys less than 1024 bits so businesses that are still using weaker keys better get busy. Read More

Security: What if all law enforcement agencies could do instant DNA analysis?
What would happen if everyone could do DNA analysis within minutes using a simple computerized box that accepted a person's cell samples on a swab and spit out the answer about a person's genetic identity automatically? Read More

Microsoft to patch 20 bugs next week in month of Office updates
Microsoft today announced it will deliver seven security updates, one critical, to patch 20 vulnerabilities in Office, SharePoint Server, SQL Server, Windows and other parts of its product lineup. Read More


WHITE PAPER: Dell SonicWall

Why Protection and Performance Matters
Outdated firewalls can pose serious security risks and simply adding malware protection inhibits performance. Dell SonicWALL Next-Generation Firewalls overcome these limitations with multi-core architecture and Reassembly-Free Deep Packet Inspection for unrivaled protection and performance. Read Now!

Is antivirus dead? Startup launches first 'exploit blocking' program
Silicon Valley startup ZeroVulnerabilityLabs has made available a free program it claims stops malware from exploiting a wide range of software vulnerabilities regardless of whether these flaws are publically known or not. Read More

U.S. goes after alleged pack of Russian agents sending military high-tech to Russia
The U.S. government yesterday busted what's alleged to be a Russian-agent ring disguised as a Texas-based company illegally transferring high-tech electronics to the Russian military. Read More

Router flaw allowed DNS attack on 4.5 million DSL gateways
Details have emerged of an extraordinary attack in which millions of DSL broadband routers in Brazil were hit by a serious software flaw that allowed criminals to gain complete control of all web traffic running through them. Read More

TraceSecurity rolls out cloud-based risk, compliance and audit tool
TraceSecurity today announced a cloud-based risk, compliance and audit tool that lets enterprises poll internal network assets and deliver live reports about how well the enterprise is keeping up complying with various security standards and regulations. Read More

See it, protect it, control it: A roundtable discussion
Network World recently asked blogger Alan Shimel, co-founder and managing partner of The CISO Group, to host a roundtable discussion with representatives from three sectors of the security community: a practitioner, an analyst and a vendor. The wide-ranging conversation touched on everything from the state of threats today to the failure of risk management, the need to share information and a massive attack suffered by the user. Read More

 
 
 

SLIDESHOWS

DEMO 2012: 20 awesome products
Augmented reality, human-computer interaction without a touchscreen, and plenty more highlight this year's DEMO Fall 2012 conference.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Major enhancements coming for Cisco Catalyst 6500
  2. IETF starts work on next-generation HTTP standard
  3. Microsoft unified communications Lync system moves closer to proverbial PBX replacement option
  4. Cisco takes next steps to blend wired, wireless networks
  5. Interop: Don't sweat 802.11ac Wi-Fi because 802.11ad will knock your socks off
  6. .xxx to launch porn search engine
  7. 6 Apple iPad mini concepts (and 1 peek at the real deal?)
  8. What if Windows 8 flops?
  9. Microsoft Office 2013's enhanced protection scheme cracked ahead of official launch
  10. Deathmatch: Apple iPhone 5 vs. Samsung Galaxy S III
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment