Friday, January 03, 2014

Is rapid detection the new prevention?

Tech's biggest flops, fails, and faux pas of 2013 | 'PGP' encryption has had stay-powering but does it meet today's enterprise demands?

Network World Compliance

Forward this to a Friend >>>


Is rapid detection the new prevention?
There's a trend underway in the information security field to shift from a prevention mentality—in which organizations try to make the perimeter impenetrable and avoid breaches—to a focus on rapid detection, where they can quickly identify and mitigate threats. Read More


WHITE PAPER: BMC Software

Forrester Workload Automation Paper commissioned by BMC
In "Industrializing IT Workload Automation," Forrester Consulting and BMC Software analyze the results of a comprehensive survey that addressed job scheduling on the ground today. Read Now!

In this Issue


WHITE PAPER: CDW

Managing Essential tools for greater productivity
People are interacting with software from the moment they wake up (hearing an alarm on a smartphone) to the time they relax in the evening (reading or shopping online). And in between, software affects virtually every work function in some way, whether in the executive suite or on the shipping dock. Read Now

Tech's biggest flops, fails, and faux pas of 2013
Read More

'PGP' encryption has had stay-powering but does it meet today's enterprise demands?
PGP encryption, as industry old-timers know, started out as "Pretty Good Privacy" invented by Phil Zimmermann in 1991, and since then, was sold on to various corporate owners until it ended in the hands of Symantec in 2010. While it is a widely used vintage brands, does PGP public-key encryption still meet today's enterprise demands, given the rise of cloud computing and mobile? Read More

INSIDER
Is open source encryption the answer to NSA snooping?
When Unisys CISO John Frymier came in to work on Friday, Sept. 6, the phones were ringing, and continued to ring all day. Customers were panicking over the news headlines of the day before. Read More

Security researcher cancels talk at RSA conference in protest
Security researcher Mikko Hypponen has canceled his talk at a RSA security conference in San Francisco, reacting to a report that the security division of EMC allegedly received US$10 million from the U.S. National Security Agency to use a flawed random number generator in one of its products. Read More


WHITE PAPER: HP Tipping Point

The Bot Threat
Download this whitepaper and learn how bots work and how, by adopting the right strategy, you can use a defense-in-depth strategy to effectively prevent direct attacks against your critical systems. Learn More

Quantum crypto, standard private key blended for first time
ID Quantique has found a way to blend quantum-key cryptography with more traditional crypto, the Advanced Encryption Standard (AES). The effect is to gain certain advantages offered by both for private-key-based encryption. Read More

Inside knowledge likely in Target breach, experts say
How did what is likely to be one of the largest data breaches in history occur? Some speculate it was only possible with insider knowledge Read More

A Look at the Fallout From the 2013 Snowden Leaks
Stories based on leaks from former NSA contractor Edward Snowden first began appearing in June. As 2013 comes to an end, the fallout may be just getting started. Here's a look at 15 ways the tech sector and lawmakers have reacted to the NSA's surveillance practices. Read More

Hackers claim to expose phone information of 4.6 million Snapchat users
Phone numbers paired with user names of over 4.6 million alleged Snapchat users were posted online by hackers, a few days after a security research group claimed a vulnerability in the social sharing service that could allow attackers to match phone numbers to Snapchat accounts. Read More


WHITE PAPER: HP and Intel® Xeon® processors

Virtualizing Your Infrastructure with a Path to the Cloud
IT needs to deliver more services, with greater agility and a high level of availability while keeping operational expenses low. This paper explains 5 reasons to deploy blades as you build out your virtualized infrastructure. Learn More

Skype's social media accounts targeted by hacker group
Skype said its social media properties were targeted, with a group styling itself as the Syrian Electronic Army appearing to claim credit for the hacks. Read More

The security industry found its dream enemy in 2013 -- and new technical challenges too
2013 was the year we learned we must encrypt our data if we don't want the likes of the U.S. National Security Agency or the U.K. Government Communications Headquarters reading it as it crosses the Internet. Read More

Apple, Cisco, Dell unhappy over alleged NSA back doors in their gear
Germany's Der Spiegel reports that the NSA has compromised a wide range of hardware for years to enable its spying Read More

Cloud computing 2014: Moving to a zero-trust security model
The leaking of classified documents detailing the data collection activities of the U.S. National Security Agency earlier this year reignited some long-standing concerns about the vulnerability of enterprise data stored in the cloud. Read More

US judge dismisses challenge to border laptop searches
U.S. Customs and Border Protection can search travelers' laptops and other electronic devices without a show of reasonable suspicion, according to a federal judge's dismissal of a 2010 lawsuit on Tuesday. Read More

2013 tech news quiz
Snowden, Ballmer, 3D handguns, iPhone 5s – this year had it all Read More


SLIDESHOWS

10 best Android smartphones of 2013

2013 was a big year for the Android smartphone ecosystem.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 7 sneak attacks used by today's most devious hackers

2. 5G Wireless: Reality looks to catch up with hype

3. Apple, Cisco, Dell unhappy over alleged NSA back doors in their gear

4. Apple strips CEO Cook of $4M in stock grants for poor share performance

5. Predictions gone wrong: Losing bets analysts made for 2013

6. 2014 tech industry conferences and events for enterprise network pros

7. 7 things on Microsoft's 2014 to-do list

8. The illustrious history of Cisco's Catalyst LAN switches

9. Cloud computing 2014: Moving to a zero-trust security model

10. 2014 Forecast for Cloud Computing


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment