Friday, July 12, 2013

10 Hot Security Startups to Watch

10 funny videos about computer passwords | Shootout results: Best security tools for small business

Network World Compliance

Forward this to a Friend >>>


10 Hot Security Startups to Watch
Tablets and smartphones, which employees are bringing into work in "Bring Your Own Device" (BYOD) style, are leading IT managers to ask security questions, starting with whether they should sort out corporate mobile apps and data from personal ones. It's all encouraged a spate of security start-ups to come up with their own answers, and highlighted here are a few that have recently hung out a shingle for mobile security. But it's not just mobile spurring the creation of young security firms out to change the world. Read More


WHITE PAPER: HP

eBook: Security for a faster world
This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals. Learn more.

WHITE PAPER: Dell Inc.

Rapid Virtualization Deployment for Private Clouds
Effective private cloud deployment requires a virtualized environment that facilitates easy management of workloads, efficient creation and migration of virtual machines, and rapid delivery of services. Learn More

10 funny videos about computer passwords
Remember the time you forgot your password? You can laugh about it now. Read More

INSIDER
Shootout results: Best security tools for small business
If you run a small business, you have a lot of choices to protect your network. You can buy a consumer-grade router for less than $50, you can spend more than $4,000 for an enterprise firewall, or you can select something in between. Read More

BYOD breeds distrust between workers and IT
The Bring Your Own Device (BYOD) movement is supposed to boost worker productivity but a study released on Monday said it can also breed distrust between employees and IT departments. Read More

Bit9 CEO: Trust-based model the new weapon in war against malware
Bit9 chief executive Patrick Morley talks mobile security, company partnerships with FireEye and Palo Alto Networks, and the evolving role of today's CISO Read More


WHITE PAPER: Crittercism

There is no 'I' in Team, but There is '$' in Failure
The mobile enterprise has arrived. In a world where there will be more devices than people on earth by 2017 according to Cisco's Visual Networking index (VNI), mobility will continue to transform enterprises in a profound way that cannot be ignored. Read more!

Foreign messaging services complicate government spying
Pirate Bay co-founder's new service, called Heml.is, hides the plaintext information from any entity collecting the data Read More

Microsoft's new app security rules dubbed a paper tiger
One analyst said he believes giving developers six months to fix an app, so as to not scare away developers, is excessive Read More

Feds asked to sit out Defcon hacking conference this year
The organizers of the Defcon hacking convention have publicly asked U.S. federal government workers not to attend the event this year due to tension in the hacker community caused by the recent revelations about the U.S. government's electronic surveillance efforts. Read More

Google researcher's outing of Windows vulnerability may have led to cyber forays
Microsoft detects targeted attacks after Windows flaw made public Read More


WEBCAST: PC Connection

Cisco UCS Manager Demo
Watch this webinar in which Chris King, Consulting Systems Engineer for Cisco, demonstrates Cisco UCS Manager - the single tool to manage the entire UCS environment without separate/additional applications or hardware. View now.

Cryptocat vulnerability excuse sparks debate over open source
Is proprietary software inherently more secure? Or is it the other way around. Security experts weigh in. Read More

Spam blizzards used to hide malicious activities
Distributed Spam Distraction attacks may last up to 24 hours, and inundate an inbox with as many as 60,000 messages, AppRiver report notes Read More

Despite encryption carrot, California companies chose risky stick
State Attorney General report reveals some businesses reluctant to scramble data to protect it Read More

The weirdest, wackiest and coolest sci/tech stories of 2013 so far
From cool robots and unmanned aircraft to celebrity swatting and Moby Dick emoticons, it's been an interesting high-tech year! Read More


SLIDESHOWS

6 rising open source stars

Names you'll want to know in the free software/open-source world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 6 highest/lowest paid IT jobs

2. Best college tech majors for landing a top starting salary

3. How to solve Windows 8 crashes in less than a minute

4. Cisco impresses with first crack at next-gen firewall

5. 8 hot mobile startups to watch

6. 10 biggest home networking mistakes (and how to fix them)

7. Meet the next open-source stars

8. The worst cloud outages of 2013 (so far)

9. The biggest security snafus of 2013

10. A look at 22 Linux Foundation newbies


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment