Friday, September 13, 2013

Cisco takes aim at security services with new division

14 geeky ways to celebrate Friday the 13th | VCs throwing gobs of money at cloud, security, mobile startups

Network World Compliance

Forward this to a Friend >>>


Cisco takes aim at security services with new division
Cisco today said it would add a security arm to its existing services division with an eye toward pushing its support of its security products as well as offering a range of managed security services. Read More


WEBCAST: HP & Intel®

Cloud Knowledge Vault
According to market research, more than 60 percent of enterprises will have adopted some form of cloud computing by 2013. Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources in this HP & Intel® Cloud Knowledge Vault. View Now

WEBCAST: Egnyte

The Benefits of Hybrid Cloud Sharing
Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with short videos, white papers and demos. View Now!

14 geeky ways to celebrate Friday the 13th
Don't be scared, there's plenty to do on Friday, Sept. 13 Read More

VCs throwing gobs of money at cloud, security, mobile startups
Tech startups focused in hot areas such as virtualization, mobility and security have pulled in tens of millions of dollars over the past week or so from venture capitalists looking to back the next big thing. Read More

What the NSA chief didn't tell Black Hat
When NSA chief Gen. Keith Alexander addressed Black Hat earlier this year, he painted a rosy picture of how well the agency controls access to its phone record database, but he never brought up cases when those controls broke down, unauthorized access was made and data was shared among analysts who shouldn't have seen it. Read More

INSIDER
IT Resume Makeover: How to Showcase Your Strengths
Your resume needs to be more than a description of the roles you previously held. It needs to tell the story of you. Learn what it takes to showcase the skills that will get you hired. Read More


WHITE PAPER: Cisco Wi-Fi Challenge NWW Jun-Aug13

Cisco Connected Mobile Experiences
Whether you are in retail, hospitality, healthcare, transportation, or another industry, keeping and attracting customers is crucial to the success of your organization. Cisco Connected Mobile Experiences can help you improve customer loyalty and increase revenue. Learn more.

Apple's iOS 7 gives security pros a lot to like
New mobile OS, launched with its iPhone 5S and 5C and a free update for iOS 6 users, should strengthen Apple's appeal in the enterprise Read More

Security experts question if Google's Chrome Apps is worth the risk
Worry based on security issues with cross-platform tech such as Flash and Java, which 'pioneered the write once, infect everywhere model' Read More

How to spot a phishing email
The editorial team at CSO were targeted by a phishing campaign recently. If it had been successful, the person(s) behind it would have tricked us into installing the Zeus Trojan, which is financial malware. Lucky for us, however, our user awareness training took hold, and we used some basic logic in order to spot the scam. Here's an overview of the phishing message itself, and the thought process used to determine that it was a scam. Read More

Buggy Microsoft update hamstrings Outlook 2013
An Office 2013 non-security update, part of yesterday's massive Patch Tuesday, blanks the folder pane in Outlook 2013, the suite's email client, drawing complaints from users. Read More


WHITE PAPER: Xirrus

Optimize Your Wi-Fi Network
Driven by the rapid evolution of mobile devices, the move to cloud-based applications and data, and the continued development of new wireless technologies, Wi-Fi has become the network of choice for connectivity. Most new devices no longer have wired connectivity. IT managers now count Wi-Fi as an essential business facility. Learn more.

Google plan to thwart government surveillance with encryption raises stakes
Strategy would make probing data flow expensive and hard, likely forcing the NSA to obtain a court order for targeted data Read More

The iPhone 5s fingerprint reader: what you need to know
So Apple has announced that it's building a fingerprint reader into its new flagship smartphone, the iPhone 5s, calling that technology Touch ID. Here's what you need to know about it. Read More

Obamacare data hub is secure and ready to roll
The central system built to support Affordable Care Act health insurance exchanges has successfully completed security testing and is set begin operating on October 1, the Centers for Medicare & Medicaid Services announced Wednesday. Read More

National Cyber Security Hall of Fame inducting five
The National Cyber Security Hall of Fame has announced five security pioneers will be inducted next month for their work on such fronts as intrusion detection and trusted computing. Read More

Start-up offers IT security rating system
It's not uncommon for companies to want to try and evaluate the IT security of another business before entering into an e-commerce arrangement. Now a start-up, BitSight Technologies, is out with what it calls a "rating" service to do exactly this, though there are limits to how far it can go at this point. Read More

Products of the week 9.9.13
Our roundup of intriguing new products from companies such as Symantec and Barracuda Networks Read More


SLIDESHOWS

10 Sorriest Technology Companies of 2013

Microsoft, Apple and Samsung among those issuing mea culpas.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. First look: Apple iPhone 5S and iPhone 5C

2. What online news looked like on 9/11

3. Apple stuns with 64-bit iPhone 5S; unveils lower-priced 5C

4. 15 geeky places to visit before you die

5. Cisco takes aim at security services with new division

6. 10 hard-earned lessons of a lifetime in IT

7. Fatal distraction: 7 IT mistakes that will get you fired

8. 15 most powerful Big Data companies

9. How Microsoft's Surface 2 and Surface Pro 2 are better suited for businesses

10. 10 amazing Linux desktop environments you've probably never seen


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: