Friday, February 14, 2014

What ever happened to the 'FIDO Alliance' that was going to revolutionize authentication?

11 best places to take a techie on a date | 5 biggest mistakes of IT hiring managers

Network World Compliance

Forward this to a Friend >>>


What ever happened to the 'FIDO Alliance' that was going to revolutionize authentication?
What ever happened to the "FIDO Alliance," that industry group that first showed up a year ago saying it was going to revolutionize e-commerce online authentication by promoting a new multi-factor authentication protocol? Turns out the revolution in security is slow in coming but they're making some progress. Read More


WHITE PAPER: 8x8, Inc

Gartner's Unified Communications as a Service Report
See what Gartner Inc., the world's leading information technology research and advisory firm, has to say about choosing the right Unified Communications solution for your business. Gartner's Magic Quadrant compares 16 of the leading UCaaS providers and names 8x8 a leader based on completeness of vision and ability to execute. Learn more >>

In this Issue


WEBCAST: IBM

Tame the data explosion with IBM Real-time Compression
Learn about IBM's unique Real-time Compression technology that can enable storing up to 5x as much data in the same storage space. Learn More

11 best places to take a techie on a date
Not too late to plan a Valentine's Day extravaganza Read More

INSIDER
5 biggest mistakes of IT hiring managers
As IT hiring ramps up in 2014, many job market experts are predicting a tech talent shortage. And certainly among the hot skill sets – security, Big Data, .NET and Java developers, project managers, business analysts and anyone with cloud or mobile experience – you can expect to see some sort of talent war, says Matthew Ripaldi, senior vice-president at Modis, a global provider of IT staffing services. Read More

Elon Musk sidekick, ex-Juniper exec leads new batch of security startups
It's already been a prolific year for new IT security companies, and now Bitglass, Spikes Security and Cybereason are making their debuts this month. Read More

Patch Tuesday surprise: Microsoft unexpectedly issues patches for 24 critical Internet Explorer flaws
Microsoft has issued patches for 24 vulnerabilities in Internet Explorer, fixes that the company didn't disclose in its preliminary listing of security bulletins it released last week. Read More


WHITE PAPER: Dell Software

What to Look for When Evaluating Next-Generation Firewalls
These liabilities create security vulnerabilities and force enterprises into expensive workarounds like deploying separate gateway antivirus products and intrusion prevention systems (IPS).Next-Generation Firewalls remedy these problems. Learn More

Ransomware like Cryptolocker uses Bitcoin, other virtual currencies for payment
Attackers use malware to hold personal data hostage until victims shell out money to get it back. Here's how to prevent it from happening to you Read More

'The Mask' malware sets standards hackers are sure to follow
A recently discovered hacking group called "The Mask" has set a new standard for malware used in sophisticated attacks against government agencies, industry and research organizations, experts say. Read More

6 tips for smartphone privacy and security
In the digital world, things are getting worse rather than improving with regard to the populist quest for personal privacy and security. Our smartphones track wherever we go, what we say, who we say it to, our likes and dislikes, and when we are playing games instead of working. Our computers track and record the same types of information day in and day out. Read More

FBI/FTC warn: Online love swindles flourish around Valentine's Day
Online dating and romance sites are obviously popular and because of that, regardless of the millions of admonitions to watch out for con artists, they are also a growing favorite of heartless scammers. Read More


WHITE PAPER: HP and Intel®

Cloud Insight: 6 facts for defining a cloud strategy
Misinformation may be the most daunting obstacle when building an IT infrastructure. To help you separate the facts from the hype, experts from HP Technology Consulting have created this informative guide to provide you with the insight you need to make decisions about successful cloud strategies. Read Now>>

Protect your PC in the web's worst neighborhoods
Your data. Your wallet. Your identity. In the darker corners of the internet, it's all fair game, and disaster could be one unwitting click away. Protect yourself by learning about the web's most common dangers, and how to avoid them. Also, take some basic steps to make your PC more resistant to harm. Read More

Measuring the effectiveness of your security awareness program
As Yogi Berra put it, "If you don't know where you're going, you'll end up someplace else." Do you know where you're going with respect to your privacy and security awareness programs? How will you know when--or if--you get there? Read More

Shift to EMV cards expected to increase online fraud
Next year's scheduled changeover to chip-and-pin debit and credit cards is expected to reduce in-store fraud, while significantly increasing fraudulent purchases online, experts say. Read More

Cryptolocker scambles US law firm's entire cache of legal files
A small US law firm has bravely admitted losing its entire cache of legal documents to the Cryptolocker Trojan despite attempting to pay the $300 (APS180) ransom in a bid to have them unscrambled. Read More

California bill proposes mandatory kill-switch on phones and tablets
Politicians and law enforcement officials in California will introduce a bill on Friday that requires all smartphones and tablet PCs sold in the state be equipped with a digital "kill-switch" that would make the devices useless if stolen. Read More

16 weirdest places you'll find Linux
Linux is everywhere, if you look for it. Read More


SLIDESHOWS

Steve Ballmer's retirement plans

The retired Microsoft CEO is now ready to ride off into the sunset. But what will he do?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 16 weirdest places you'll find Linux

2. Cisco profit halved as revenue falls

3. How Apple's iBeacon location sensing tech works

4. Windows XP isn't the only software getting the knife in 8 weeks

5. 11 best places to take a techie on a date

6. Top 10 States for IT Jobs

7. Understanding the differences between Software Defined Networking, network virtualization and Network Functions Virtualization

8. Apple's iBeacon turns location sensing inside out

9. 5 biggest mistakes of IT hiring managers

10. Fibre Channel will come with 32-Gigabit, 128-Gigabit speeds in 2016


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: