Friday, January 11, 2013

12 Security Startup to Watch

  Twenty free and effective infosec tools | When to call for help after a data breach
 
  Network World Compliance

Forward this to a Friend >>>


12 Security Startup to Watch
Despite security concerns, businesses are growing more confident in adopting cloud-based services, and in addition are investing more in corporate mobile devices while also allowing employees to use their own in bring-your-own-device mode at work. So it's not surprising that recent security startups are zeroing in on things such as encrypting data held in the cloud or how to safeguard corporate data on BYOD devices. Read More


WHITE PAPER: Brocade

Scaling Out Data Centers
Organizations of all sizes are facing daunting challenges as they struggle to adapt their data center networks to new technologies and applications. The move toward cloud architectures in particular is demanding a high-performance network interconnect that can host servers potentially numbering in the thousands. Read Now

WHITE PAPER: Avaya

Delivering game-changing productivity & dependability
By creating one contiguous, end-to-end Fabric, Avaya is empowering businesses to achieve unprecedented levels of infrastructure productivity, service agility, and network dependability, the very essence of the fast, flexible, and secure design aspirations. Read Now

Twenty free and effective infosec tools
We asked readers to name the free tools they find most useful in their daily work as infosec practitioners. Here are 20 that stand out. Read More

When to call for help after a data breach
In spite of best practices, it is likely your organization will experience a serious data breach at some point. Once the initial shock wears off you'll be faced with numerous decisions, the most significant of which is whether to seek help from outside professionals such as attorneys, computer forensics investigators, information security consultants, privacy consultants and law enforcement. Read More

INSIDER
Single sign-on moves to the cloud
We are awash in passwords, and as the number of Web services increases, things are only going to get worse. Trying to manage all these individual passwords is a major problem for enterprise security. Many end users cope by re-using their passwords, which exposes all sorts of security holes. Read More


WHITE PAPER: Ixia Anue

The Evolving Visibility Challenge
Network monitoring has become more complex over the last few years, due in large part to virtualization and convergence. Learn how a state-of-the-art monitoring system that maximizes your existing monitoring tool investment can help you attain greater visibility into your network without adding complexity. Say goodbye to virtual blind spots. Learn More

Better business-government teamwork needed to categorically fight cyberthreats
The Business Roundtable, the association of 210 chief executive officers whose companies account for more than $7.3 trillion in annual revenues and 16 million employees, today said that cyberthreats to their businesses have become so severe, a new way of sharing real time security information needs to be set up among companies and with the U.S. government. Read More

Most glamorous CES 2013 celebrity sightings
A former U.S. President, a Sesame Street character and assorted music makers turn heads at International CES in Vegas. Read More

Many global organizations flub electronic-records requests
More companies are tackling how to best set up their electronic records to be able to respond to any legal requests related to "electronic discovery" to quickly find internal documents for court purposes, but this "e-discovery" process is still a struggle, a survey published today indicates. Read More


WHITE PAPER: HP & Intel® Xeon® Processors

Top 10 Benefits of Virtualization
In this eGuide, Network World sister publications InfoWorld, and PC World examine some of the current uses of blade servers in today's data center, as well as how trends such as server virtualization are reshaping enterprise computing. Read Now!

Voice 'fingerprints' may plug call-center security leaks
You've heard such stories. Mat Honan, a reporter for Wired magazine had almost his entire digital life erased when a fraudster used social media account information to trick Apple and Google into allowing him access to Honan's account information. Read More

Segregated healthcare networks rarely work, expert says
There are ways for healthcare organizations to protect the electronic health records (EHR) of their patients. But a segregated network for EHR is generally not one of them, says Martin Fisher, director of information security for Atlanta-based Wellstar Health System. Read More

Cybercrime attacks on business bank accounts are dropping
Attacks by cybercriminals to steal funds electronically from commercial bank accounts appear to be less successful of late than in previous years, according to a survey of 100 large and small financial institutions. Read More

12 Security Resolutions for 2013
Among your typical New Year's resolutions--lose weight, stop smoking, be happier--you should consider making some pledges to better secure your digital life. You might even be healthier if you can prevent the stress of a digital disaster, like malware wiping out your PC, having your online accounts hacked, or becoming a victim of identify theft because of a phishing scam or data theft. With that in mind, here are some security resolutions you should consider for the new year. Read More

 
 
 

SLIDESHOWS

Best of CES 2013: In pictures
Here's what's grabbing our attention right now at the sprawling CES 2013 gadget show in Las Vegas.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 'Worst CEO' list calls out Zynga's Pincus, Zuckerberg's 'hoodie mentality'
  2. Cool iOS accessories for iPhone and iPad unveiled at CES 2013
  3. Amazon's cloud hiccups, again
  4. Extreme Networks cutting 13% of workforce
  5. Five smartphone trends from Las Vegas
  6. Best of CES 2013: in pictures
  7. 12 must-watch security startups for 2013
  8. 10 wireless charging technologies on display at CES 2013
  9. Voice 'fingerprints' may plug call-center security leaks
  10. 8 classic IT hiring mistakes and how to avoid them
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: