Friday, October 18, 2013

Cisco: controversial NIST crypto not invoked in products

Best Tech-o-Lanterns of 2013 | What the Internet of Things means for security

Network World Compliance

Forward this to a Friend >>>


Cisco says controversial NIST crypto – potential NSA backdoor -- 'not invoked' in products
Controversial crypto technology known as Dual EC DRBG, thought to be a backdoor for the National Security Agency, ended up in some Cisco products as part of their code libraries. But Cisco says they cannot be used because it chose other crypto as an operational default which can't be changed. Read More


WHITE PAPER: Xirrus

Optimize Your Wi-Fi Network
Driven by the rapid evolution of mobile devices, the move to cloud-based applications and data, and the continued development of new wireless technologies, Wi-Fi has become the network of choice for connectivity. Most new devices no longer have wired connectivity. IT managers now count Wi-Fi as an essential business facility. Learn more.

WHITE PAPER: Juniper Networks

A Proven Solution for Today's BYOD Demands
Wireless access is mission-critical for most organizations. BYOD has accelerated the need or wireless capacity, and WLANs must deliver a robust wired-like experience in today's dense environments. High-scale, third-party testing has validated Juniper's ability to support the densest BYOD environments while delivering reliable wireless access. Learn more.

Best Tech-o-Lanterns of 2013
We've updated our collection of cool, scary and fun pumpkin carvings from around the web. Read More

What the Internet of Things means for security
You've probably been hearing a lot lately about the Internet of Things (IoT). The IoT (see: "The IoT: A Primer" at the end of this piece), while still in the early stages of development, is slowly making its way into the mainstream as more objects become connected via technology such as radio frequency identification (RFID) and the iniquitousness of the Internet. Read More

INSIDER
SDN pioneers share their secrets
With the ability to create virtual networks quickly and efficiently – rather than programming network-connected hardware on an individual basis – software defined networks (SDN) appear to be the time-and-resource saving solution that overwhelmed IT managers have been looking for. Read More


WHITE PAPER: Ipanema Technologies

Don't Let App Performance Problems Drag You Down
Check out this exclusive IDG-Ipanema survey to learn about the far-reaching impacts of poor application performance, and what you can do about it. Learn More.

10 great videos from DEMO Fall 2013
Greetings from Santa Clara, Calif., where the annual DEMO startup show is winding down. For the past two days, we've heard from 41 startups launching new products upon the world. Will one of these be the next big thing? Perhaps. While launching a product at a show like DEMO seems like a hard prospect, the hard work continues for these startups as they grow their business. Read More

Apple's claim of unbreakable iMessage encryption 'basically lies,' researchers say
A close look at Apple's iMessage system shows the company could easily intercept communications on the service despite its assurances to the contrary, researchers claimed Thursday at a security conference. Read More

First Look: NetCitadel threat management platform in beta site
Detecting and stopping stealthy malware designed to steal sensitive information means moving fast. Start-up NetCitadel wants to put its new Threat Management Platform in the middle of the security-response game with many of the other players there now -- sandboxing, firewalling, and other technologies a company may use in order to provide a kind of orchestration and decision-making point. Read More


WHITE PAPER: AT&T

Managing Mobile Access to the Cloud
Use of mobile personal cloud services is proliferating on personal and enterprise-owned mobile devices. Organizations are considering controls that appear to conflict with the spirit of BYOD and wonder if their approach is correct. Learn More

Federal Security Breaches Traced to User Noncompliance
In an effort to lock down agency data and control access points, cybersecurity professionals in the federal government fail to consider the experience of end users, who say security policies are burdensome and often resort to workarounds. Read More

Internet infrastructure groups move away from US gov't over spying
After recent revelations about the U.S. National Security Agency's widespread surveillance of Internet communications, the coordination of the Internet's technical infrastructure should move away from U.S. government oversight, said 10 groups involved in the Internet's technical governance. Read More

Security spending continues to run a step behind the threats
Security professionals are being hammered by a powerful combination of forces: As IT systems get more difficult to defend--more open, mobile and shared--cyber-threats are also evolving to more swiftly penetrate enterprise defenses. Read More

Security vendor admits mistake in website take down
Rapid7 has acknowledged that it waited too long to take the security actions needed to prevent a pro-Palestine hacking group from taking down two of its websites by sending a fax to the sites' registrar. Read More


SLIDESHOWS

8 most interesting tech gadgets of 2013

Here's a list of the eight most significant tech gadgets released to date. These aren't necessarily the best selling or most popular, but each stands out for one reason or another.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Remarkable reunion made possible by Google Earth

2. Yes, indeed, Yahoo has that Y3K problem under control

3. 20 must-see products at DEMO 2013

4. Dexter malware kills again

5. Ethernet's 400-Gigabit challenge is a good problem to have

6. 12 drones to own

7. Most parents allow unsupervised Internet access to children at age 8

8. The unsung women of technology

9. Alcatel-Lucent challenges Cisco, Brocade unified access

10. With Windows 8.1, Microsoft seeks redemption of bold, flawed OS redesign


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: