Friday, December 13, 2013

A clear-eyed guide to Android's actual security risks

The biggest Internet security challenges of 2013 | World of Spycraft: NSA and CIA Spied in Online Games

Network World Compliance

Forward this to a Friend >>>


A clear-eyed guide to Android's actual security risks
If you're an Android user -- or want to be -- you've likely heard about all the security risks of Google's mobile operating system. But how real are these threats, and how much damage can they do? Despite the fears, are Android devices actually a safe bet for an enterprise mobility strategy? Read More


WHITE PAPER: CDW

Software Asset Management: Practices for Success
This white paper discusses best practices that can dramatically increase your success rate of a SAM deployment. Make sure and follow these steps and verify that your SAM toolkit has the necessary functionality to keep your organization steps ahead of the competition -it's a long term investment. Read Now

WHITE PAPER: Dell

EMA Radar for Hybrid Cloud Integration Technologies
Which cloud integration platform is right for your company? EMA Radar evaluated 7 leading cloud integration platform vendors for the value they deliver. How did they rank? Which is the right fit for your business? Read EMA Radar's report and learn more. Learn More

The biggest Internet security challenges of 2013
From the attack on privacy and Cryptolocker to Eric Snowden and the NSA, it's been a challenging year Read More

World of Spycraft: NSA and CIA Spied in Online Games
Not limiting their activities to the earthly realm, American and British spies have infiltrated the fantasy worlds of World of Warcraft and Second Life, conducting surveillance and scooping up data in the online games played by millions of people across the globe, according to newly disclosed classified documents. Read More

Foundation exec slams Microsoft for 'meaningless' security pledge
The Free Software Foundation on Thursday attacked Microsoft for "meaningless" public statements on privacy and security, claiming that Windows is "fundamentally insecure." Read More


WHITE PAPER: Limelight Networks

Predictive Performance: Measuring the Digital Experience
As websites get more immersive and more complex, organizations need to rethink what, and how, digital experience performance is measured. Speed (or responsiveness) is only one of several factors to consider. Learn More

Why CIOs stick with cloud computing despite NSA snooping scandal
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet. Read More

Juniper: Quick look at security strategy behind its SDN controller security
Juniper Networks in September made its software-defined network (SDN) controller known as Contrail generally available. Network World Senior Editor Ellen Messmer delves into the security strategy behind the Contrail controller in a discussion with Juniper's Senior Director of Product Management Jennifer Linn, and Chris Hoff, vice president of strategic planning in the security business unit at Juniper. Read More

The top 8 security threats of 2013
The past year has seen its share of newly emerging or persistent threats that security and IT executives need to be aware of and in many cases defend against. Read More


WHITE PAPER: Salesforce.com

5 Steps to Better Sales Performance: How to Coach Your Team
In 5 Steps to Better Sales Performance we reveal the proven methods the best sales managers rely on to close the sales performance gap between average performers and All-Stars. Download now. Read now!

Symantec walks away from managed firewall and endpoint services
Symantec has downsized their Managed Security Services portfolio, ending support for the managed firewall and managed endpoint offerings. Symantec says the change is part of an effort to streamline things within the company's Information Security portfolio, but what does that mean for existing managed security customers? Read More

A fistful of security fixes to help CSOs stay ahead of risks
No matter how valiant the efforts of chief security officers, or how much businesses say they focus on securing their systems, or the amount of money spent on IT defenses -- many of the same IT security challenges persist. Read More

Identity-theft vulnerability fixed in Microsoft Office 365, says security firm
Microsoft has plugged a vulnerability in Microsoft Office 365 that would have let attackers grab user identities and steal email and documents, according to Adallom, the security vendor that says it discovered the problem. Read More

Other browser makers follow Google's lead, revoke rogue certificates
Microsoft, Mozilla and Opera Software today joined Google in revoking rogue digital certificates that had been issued by a subordinate certificate authority (CA) of France's cybersecurity agency. Read More

Cloud Security Alliance offers ultra-high cloud security plan
The Cloud Security Alliance (CSA) is putting forward an innovative encryption-based security architecture for software-defined networks and cloud environments that draws some of its inspiration from high-security networks used by the U.S. Department of Defense and intelligence agencies. Read More


SLIDESHOWS

8 tricks to optimize Windows 8.1

Here are eight things we recommend doing to make Windows 8.1 more efficient.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 Linux distros to watch in 2014

2. 25 (mostly) tech company logos with hidden meanings

3. Stats don't lie: Windows 8 has failed

4. Microsoft tries to lure Gmail users with automated Outlook.com migration tool

5. Juniper EVP Muglia abruptly quits

6. The worst IT project disasters of 2013

7. 10 top tests of 2013

8. PC World's 50 best tech products of 2013

9. The top 8 security threats of 2013

10. How (and Why) to Get Started With SDNs


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: