Friday, February 21, 2014

The 12 most powerful security companies

Fresh batch of security start-ups aim to safeguard mobile devices, SaaS apps | Why companies need to check their handling of internal threats

Network World Compliance

Forward this to a Friend >>>


The 12 most powerful security companies
Read More


WHITE PAPER: IBM

IDC Report: The Future of eMail is Social
This IDC white paper takes a look at the current state of enterprise email and the perceived and real problems that surround its use. The paper discusses the changing nature of collaboration and work fueled by the social Web by examining current email trends and the emergence of new social collaboration tools. Learn More.

WHITE PAPER: Dell Software

Quantifying the Impact of Network Based Attacks
This document will give you some guidelines on how to assess the impact of network-based attacks on your organization. We will look at: • Different types of network-based attacks • How those attacks can affect your bottom line • Methods of quantifying the impact of those attacks Learn more!

Fresh batch of security start-ups aim to safeguard mobile devices, SaaS apps
Security start-ups continue to blast out of stealth mode, and among the ones seen this week, the focus is on mobile security as well as cloud-based monitoring and threat detection of software-as-a-service applications such as Salesforce and Box. Read More

Why companies need to check their handling of internal threats
Security pros should reevaluate their use of technology and policies to bolster defenses against insider threats that many organizations downplay, a new study shows. Read More

One tweak can make your Windows PC virtually invulnerable
Microsoft published 147 vulnerabilities in 2013 that were rated as Critical. Critical, however, is a relative term, and there is one simple thing anyone can do that would guard against almost every single Critical vulnerability according to a new report from Avecto. Read More


WHITE PAPER: Dell Software

Unchain Your Network with Application Intelligence & Control
This paper discusses the new risks of Web-based applications, and offers best practices for gaining control of applications, data and bandwidth. Read now!

Zeus malware-botnet variant spotted 'crawling' Salesforce.com
The Zeus Trojan, malware long known to steal banking credentials to siphon off victims' funds, has been spotted being put to yet another devious use: swiping business data from Salesforce.com. Read More

Report finds iOS apps riskier than Android apps
How many apps do you have on your smartphone or tablet right now? Well, take that number, and multiply it by 0.9. That's about how many of your apps are a potential security concern according to a new study from Appthority. Read More

Time to drop unnecessary admin privileges
A new study shows that CSOs could dramatically lower the risk of malware infection by becoming a lot stingier with the number of company employees given administrator accounts on computers. Read More


WHITE PAPER: Crittercism

Performance Management: The Mobile App Development Playbook
This comprehensive 16 page Forrester Research, Inc. report, authored by Jeffrey Hammond, Forrester VP and Principal Analyst, details a number of valuable, commonly collected metrics and describes the tools and frameworks that can help you collect them. Read now!

Asus, Linksys router exploits tell us home networking is the vulnerability story of 2014
If you're using network-attached storage, video surveillance equipment, or remote router management software, beware of dodgy firmware--it's become ground zero for hacker exploits, as recent debacles withA Asus and Linksys routers emphatically illustrate. The message is clear: In 2014, vulnerable routers, NAS boxes, and other connected devices are leaving our home networks wide open to attack. Read More

McAfee plans enterprise security package for fast threat detection and response
McAfee says it's developing a product it calls "Threat Intelligence Exchange," which it expects to introduce by mid-year as a core means to garner information about cyber-attacks and response for the enterprise. Read More

6 tips to combat Advanced Persistent Threats
The success of advanced persistent threats (APT) is reportedly so pervasive that detecting and defeating them with any consistency may seem to be a hopeless battle. Read More

Why security pros should care about Bitcoin's troubles
Chief security officers who believe the latest Bitcoin problems do not affect them should think again. Securing such digital currency flowing through peer-to-peer payment systems may one day be the responsibility of security pros. Read More

15 Ways to Make Sense of Calls for NSA Reform
President Obama has called for reforms to the National Security Agency's programs in order to strike a balance between privacy and security. However, contrasts abound between what the president has said and what his own review group and independent agencies propose. Read More


SLIDESHOWS

The 12 most powerful security companies

Some security vendors just keep getting high marks from independent test organizations and analysts year and year.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Leaked release dates shed light on Microsoft's Windows 9 plans

2. Whatever happened to the IPv4 address crisis?

3. Google eyes 34 cities for next step in gigabit fiber expansion

4. WhatsApp co-founder Brian Acton was once rejected by both Facebook and Twitter

5. Demand for Linux skills rises

6. The 12 most powerful security companies

7. Zeus malware-botnet variant spotted 'crawling' Salesforce.com

8. Microsoft Lync to play nice with Cisco, Android

9. Alcatel-Lucent works with Red Hat to virtualize mobile networks

10. With 'virgin' developers, Microsoft could fork Android


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: