Friday, October 11, 2013

Microsoft security guru: Abusing data should be a felony

Google's Graveyard: 13 products Google killed off in 2013 | SDN: The security pros and cons of using it in your organization

Network World Compliance

Forward this to a Friend >>>


Microsoft security guru: Abusing data should be a felony
If Microsoft's chief security adviser had his way, it would be a felony to misuse personal data. Read More


WHITE PAPER: Xirrus

Optimize Your Wi-Fi Network
Driven by the rapid evolution of mobile devices, the move to cloud-based applications and data, and the continued development of new wireless technologies, Wi-Fi has become the network of choice for connectivity. Most new devices no longer have wired connectivity. IT managers now count Wi-Fi as an essential business facility. Learn more.

In this Issue


WHITE PAPER: Juniper Networks

A Proven Solution for Today's BYOD Demands
Wireless access is mission-critical for most organizations. BYOD has accelerated the need or wireless capacity, and WLANs must deliver a robust wired-like experience in today's dense environments. High-scale, third-party testing has validated Juniper's ability to support the densest BYOD environments while delivering reliable wireless access. Learn more.

Google's Graveyard: 13 products Google killed off in 2013
Google giveth (including Google Death) and Google taketh away. This year, the company has sent a host of well-known and more obscure offerings to their demise. But don't worry, the company still has dozens of new and old products in its portfolio. Here's a look back at the ones killed off this year. Read More

SDN: The security pros and cons of using it in your organization
SDN benefits include automating and easing network administration duties and improving application performance. But it also introduces a number of potential threat vectors into your environment. What should you know before you invest in SDN? Read More

The toll of enterprise cybercrime: $11.8 million per year ; 122 attacks per week
A survey of 60 companies in the U.S. about the impact of cybercrime indicates that the annualized cost of dealing with cyberattacks of all kinds is now $11.6 million per year on average, up from $8.9 million last year. Read More

NSA backdoor fears creating crisis of confidence in U.S. high-tech products, services
Fears that the National Security Agency (NSA) has managed to convince U.S.-based suppliers of software, hardware and services to install backdoors for espionage purposes has created a crisis of confidence around the world. Read More


WHITE PAPER: Ipanema Technologies

Don't Let App Performance Problems Drag You Down
Check out this exclusive IDG-Ipanema survey to learn about the far-reaching impacts of poor application performance, and what you can do about it. Learn More.

Inside CIO paychecks
Bonuses, stock awards and executive perks boost pay for CIOs and senior IT leaders Read More

Hack of major data brokers weakens bank authentication
LexisNexis, Dun & Bradstreet and Kroll Background America hacks raise more doubt on the effectiveness of knowledge-based authentication Read More

Researcher argues for open hardware to defend against NSA spying
While there is no foolproof defense against government spying, snooping by entities like the National Security Agency could be made far more difficult through the use of Internet infrastructure built on open-source hardware, an academic researcher says. Read More

Shutdown could delay government's patching of IE, Windows and .NET flaws
The ongoing government shutdown could leave desktop and server systems in many federal agencies vulnerable to new threats disclosed Tuesday by Microsoft in its latest round of security updates. Read More


WHITE PAPER: VMware

The Clear Path to Cloud Security, Compliance, & Cost Control
Both customers and IT decision makers are concerned about cloud security, according to recent research. How can you negotiate this barrier to realize the benefits of cloud computing? Read this paper to learn about the techniques, tools, and technologies that will enable you to capitalize on the cloud safely and cost-effectively. Read Now

Security automation research – with a human touch – could net nearly $50M grant
Researchers from Carnegie Mellon University and Army Research Laboratory will join forces with those from a handful of universities in an effort to better automate cybersecurity decisions. The five-year project has attracted $23.2 million in funding from CMU's CyLab, and could be extended to $48.2 million over 10 years. Read More

The 'autonomous,' hackable car
It is time to start thinking of your car as another mobile device. Read More

Smart card readers for the iPhone and iPad
Flexible PKard Reader and elegant Tactivo bring smart card authentication to your favorite mobile device Read More

Google to pay rewards for open-source code security fixes
Google said Wednesday it plans to reward developers for developing proactive security improvements for some of the most widely used open-source software programs. Read More

Wireless carriers need to make changes to combat SIM-card fraud
U.S. carriers will need to adjust security tactics soon to combat an emerging threat in which criminals hijack SIM cards used to authenticate mobile phone customers on wireless networks, experts say. Read More

Vinyl records fight digital death
Vinyl record sales are actually up but heyday is obviously past Read More


SLIDESHOWS

The 'Bad Boys' of open source

The open source world's most notorious characters.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. In a room with no cell service, Verizon works on the future of mobile

2. Careers that are being automated into oblivion

3. Why I'm excited for Linux Mint 16, even though I don't like Mint

4. Gartner: The top 10 IT altering predictions for 2014

5. 10 ways IT pros can reduce stress at work

6. NSA backdoor fears creating crisis of confidence in U.S. high-tech products, services

7. Your car is about to go open source

8. Three lessons from Netflix on how to live in the cloud

9. Shh ... Cisco's latest switch supports VMware NSX

10. Inside CIO paychecks


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: