Search This Blog

Friday, February 24, 2012

Better information sharing is the future of security, experts say

  Cool Gear and Gadgets for Smartphones and Tablets | Inadequate SSL Certificate Data Threatens IT Security
 
  Network World Daily News PM

Forward this to a Friend >>>


Better information sharing is the future of security, experts say
After having founded a software security company, selling it to HP and then working for them, Roger Thornton gained valuable insight into the evolving IT security threat landscape. So, naturally, he left HP and took on a new role in an entirely different sector, where he is taking part in an initiative that aims to bring the security community to new levels of information sharing. Read More


RESOURCE COMPLIMENTS OF: Research In Motion

Introducing BlackBerry Mobile Fusion
Now all personal and corporate-owned BlackBerry® smartphone and BlackBerry® PlayBook™ devices can seamlessly access business data and applications on a single, secure management platform. Soon, Apple® iOS and Google® Android™ devices will be able to do the same. Learn how this new approach will end mobile chaos at blackberry.com/mobilefusion

WEBCAST: Compuware

Why Server Virtualization Demands and End-user's Perspective
Join Compuware and featured guest Forrester Research, Inc. in this webcast to understand Forrester's definition of the user experience network or UxN and why dynamic virtualized environments demand end user monitoring. Register now.

Cool Gear and Gadgets for Smartphones and Tablets
These enhancements include exotic skins, clever devices for transferring files, great ways to game with your phone or tablet, and more. Read More

Inadequate SSL Certificate Data Threatens IT Security
SSL certificates are a fundamental component of secure online transactions, but a new survey finds that a majority of organizations don't know where or how many certificates they actually have, and nearly as many lack an accurate idea of which certificates are about to expire. Venafi CEO Jeff Hudson says this increases organizations' operational, security and audit and compliance risk. Read More

Malware Network Threats Rising, How to Defend Yourself
Last year saw the rise of malware networks, distributed network infrastructures that exploit popular places on the Internet to repeatedly launch a variety of dynamic malware attacks. Blue Coat Labs has issued six best practices that can help organizations defend themselves against the threat. Read More

Smile for the drone: Coming to police stations near you soon
In 90 short days and counting down, it will be smile for the camera flying overhead, American citizens. Perhaps you should buy a baseball cap now to help in hiding your features from eye in the sky drones before buying a hat also becomes another ridiculous "suspicious" potential terrorist activity for SAR databases? Is that taking it too far when drones are capable of almost constant surveillance?... Read More


WHITE PAPER: Quest Software

Effectively Manage IT Compliance
IT compliance is mandatory for your business – but it doesn't have to be difficult, and when properly controlled is a boon for your company. In this four-part eBook, see how the many parts of IT compliance can be effectively managed throughout the business. Get it today. Read Now!

iPad dispute with Proview hits the US as Proview accuses Apple of deception
Over the past few weeks, Apple has been entangled in a serious legal dispute with a Chinese company called Proview. Proview alleges that it owns the iPad trademark in China and is therefore seeking a complete ban on iPad sales in the country, and though far less likely, an export ban as well. Read More

Such a tease: MWC exhibitors give video sneak peeks
A few smartphone and other device vendors have begun teasing what presumably will be products shown at Mobile World Congress (MWC), the big wireless industry event that kicks off next week in Barcelona (Network World's John Cox will be there reporting for us). Read More

Stroustrup reveals what's new in C++ 11
Latest version of language isn't major overhaul, but offers many small upgrades to appeal to different areas of development Read More

Apple acquires app search company Chomp
Apple has acquired apps search company Chomp for an undisclosed price, it said Friday. Read More


WHITE PAPER: VMware

Performance Analytics: How Normal is Your Data
This VMware paper takes a technical look at a variety of IT performance data (operating system metrics, quality-of-service metrics, business performance metrics, etc.) to determine how well these metrics can be modeled as "normally distributed." Read Now!

Dell buys AppAssure for software backup
Dell said Friday it has purchased backup software vendor AppAssure, in the first of an expected run of acquisitions following Dell's appointment of former CA CEO John Swainson as head of a new software division. Read More

Google: New privacy policy to have little impact on enterprise
Google's plan to share user data across its online services will have little effect on users of the company's enterprise, government and education application suites, the company said. Read More

Cisco Q4 Ethernet switch revenue up, HP's down
HP's Ethernet switch revenue dropped 5% in the fourth quarter vs. the fourth quarter of 2010, while market leader Cisco gained 3.3%, according to the latest IDC research. Read More

CA offers new disaster recovery option
CA Technologies has launched a disaster-recovery software-as-a-service offering that combines on-site data protection with a cloud-based service, using Microsoft Azure's infrastructure. Read More

 
 
 

SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Windows 8 logo hacked to Chinese Web site
  2. Cisco: Customers drove us to block Microsoft/Skype
  3. Carrier Ethernet 2.0 aims for global connectivity
  4. Apple's 30th birthday salute to Steve Jobs knocked off YouTube
  5. Police warn of money-stealing computer virus
  6. Five bone-headed ways stupid people will use Google Goggles
  7. iPad 3 rumor rollup for the week of Feb. 21
  8. OK Cisco, we get it
  9. A guide to tablets, great and small
  10. Hacker steals 1 million user logins from YouPorn website
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: