Friday, June 07, 2013

The top technologies the CIA thinks are hot

CirroScope: Stealthy cloud security startup hatched by ex-Symantec teammates | Researchers find Java users woefully tardy on patching

Network World Compliance

Forward this to a Friend >>>


The top technologies the CIA thinks are hot
A quick look at what technologies the Central Intelligence Agency's investment arm – known as In-Q-Tel—is investing in Read More


WEBCAST: Ipswitch, Inc

VIDEO: Layer 2 Discovery & Asset Reporting
WhatsUp Gold includes Layer 2 discovery as part of the core product bringing you automatically generated Layer 2 topology maps, IT asset reporting, current & historical network documentation, and easy-to-use troubleshooting tools. All of this available within the same interface as all your network management data. View now.

WHITE PAPER: IBM

Gaining and Executing a Smarter Understanding of Customers
This article discusses the urgent need for firms to successfully engage with customers, including handling issues such as social media and mobility, and at accomplishing this goal with smarter IBM collaboration and CRM solutions. Learn More.

CirroScope: Stealthy cloud security startup hatched by ex-Symantec teammates
A small team of ex-Symantec security experts has formed a stealthy Silicon Valley start-up called CirroScope that's focused on shielding enterprises from threats stemming from their use of SaaS applications such Box, Salesforce.com and Google Apps. Read More

Researchers find Java users woefully tardy on patching
Half of users running version two-years-old or older Read More

Report: Secret court order gives US access to Verizon call records
The U.S. National Security Agency has been allowed by a court order to collect phone records of a large number of customers of Verizon, according to a report in the Guardian on Thursday. Read More


WHITE PAPER: HP, Microsoft & Intel

HP reference configuration for Premium OLTP
This paper describes a hardware and software reference architecture for using HP hardware to deploy very large and highly transactional Microsoft® SQL Server 2008 R2 OLTP database systems in tier 1 enterprise application environments. Learn More!

Panelists decry lax security in medical devices
Security for medical equipment such as MRI machines to and pacemakers is woeful, even though these devices today connect to networks and sometimes face risks from malware or hacking, according to a panel of university researchers speaking at this week's Design Automation Conference. Read More

Mobile security incident costs, regional threat differences revealed
Surveys find threat costs run into six-figure losses for many, and that adware is the most pervasive menace Read More

Online ring for trading in stolen credit card data busted
Law enforcement agencies in the U.S., Vietnam and the U.K. have disbanded a ring that allegedly sold online credit card details since 2007. Read More


WHITE PAPER: Tripwire

Five Tips for Outsmarting the Information Age Adversary
Today's attackers vigilantly wait for you to slip up before they strike your information systems and compromise your data. Learn five actions you can take to improve your information risk management and security strategy and stay one step ahead of the information age adversary. Read More

Windows 8.1 bolsters biometrics for authentication
Microsoft's next OS update offers native fingerprint reader support Read More

Malware going retro in 2013, security firm finds
Malware perpetrators turned to their old tricks in the first quarter of this year, a threat report released Monday by the cybersecurity firm McAfee finds. Read More

7 things you can do to make Internet Explorer more secure
How well Internet Explorer--or any Web browser, for that matter--protects against attacks and malware greatly depends on whether you keep it up to date and have the right security settings. Here's how to take the proper security measures with Internet Explorer 9 and 10. Read More

INSIDER
Smartphones take center stage in two-factor authentication schemes
We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be easier to install. Read More



SLIDESHOWS

12 must-play Android games

Our top picks for gaming on your Android device.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. The top technologies the CIA thinks are hot

2. IT departments won't exist in five years

3. CCIE's raise Voice over Cisco cert move

4. Microsoft to include Outlook app with update to Windows 8 RT

10. Analyst says iPhone 4's U.S. sales injunction could cost Apple billions

8. Cisco betters its best-selling Catalyst Ethernet switch

5. Your Wi-Fi speed stinks. Here are 10 things you can do about it

9. Big Switch lowers forecast for OpenDaylight SDN effort

6. Stack wars: OpenStack vs. CloudStack vs. Eucalyptus

7. Microsoft: Hybrid cloud is good for IT, end users and corporate bottom line


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: