Search This Blog

Friday, February 24, 2012

Startup CrowdStrike promises 'game-changer' in fight vs. advanced persistent threats

Network World Security - Newsletter - networkworld.com
The BYOD struggle: From writing custom apps to defining security | Windows 8 logo hacked to Chinese Web site

Network World Security

Forward this to a Friend >>>


Startup CrowdStrike promises 'game-changer' in fight vs. advanced persistent threats
Startup CrowdStrike made its debut this week, promising to have a security product out by the second quarter that will target the so-called advanced persistent threat (APT) problem in which stealthy intruders infiltrate networks to steal sensitive data for business or political reasons. Read More


RESOURCE COMPLIMENTS OF: Cisco

Join Cisco at RSA Conference
Is your network secure for today's needs? At this year's RSA Conference, Cisco invites you to learn how the Cisco SecureX security framework can help solve your organization's biggest security challenges--from BYOD to the move to virtualization and cloud computing and stopping today's most sophisticated and persistent threats. Don't Miss Our Keynote at the 2012 RSA Conference, February 29 at 3:10pm P.T. with Cisco SVP Christopher Young and his session, "Lock It Down or Free It Up?". Click here for details and a complete list of Cisco's RSA event activities

WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

The BYOD struggle: From writing custom apps to defining security
Companies are grappling with the question of whether and how to let employees use their own smartphones and tablets at work even as a huge push is being made to set up internal "app stores" of approved and custom-built corporate mobile apps. Read More

Windows 8 logo hacked to Chinese Web site
An image of the Windows 8 logo leaked last week was hacked from the design studio's network and posted to a Chinese Web site, according to a published report. Read More

Avast Free Antivirus 7 adds cloud updates, file reputation and remote assistance
Avast Free Antivirus 7 is set to be released on Thursday and will have new features including cloud-based updates, remote assistance and file reputation. Read More


WHITE PAPER: Oracle

Copying Sensitive Data Into Non-Production Environments
Download this paper to learn data masking best practices and enable your organization to safely use production data for development, testing, and sharing with out-source or off-shore partners, without risking a sensitive data breach. Learn More!

Ultimate Man vs. Computer: Garry Kasparov, Deep Blue and the Internet
Garry Kasparov battled IBM's Deep Blue 16 years ago in February, but that was just the beginning Read More

Wireless Can Indeed Be Hazardous to Your Health – Sort of, Anyway…
Before we go too far with this, I still do not believe that electromagnetic radiation, at least in the forms used by consumers and in enterprise applications, causes any negative health impacts in humans or other living things. No cancer, no brain tumors, nothing like that. But it can, indeed, at least indirectly, cause severe injury - and I have proof. Read More

Obama Offers Blueprint for Privacy Rights on the Internet
The White House has unveiled a plan to create a "Bill of Rights" for consumer privacy on the Internet, and announced that Google, Microsoft and Yahoo have agreed to comply when consumers choose to protect their online tracking habits. Read More


WHITE PAPER: HP & Intel

CI for Dummies eBook
This book will help you understand why infrastructure convergence has been widely accepted as the optimal approach for simplifying and accelerating your IT to deliver services at the speed of business while also shifting significantly more IT resources from operations to innovation. Learn more

White House privacy push: Some question the details
The U.S. White House's announcement Thursday that it will encourage online businesses to develop and adopt privacy codes of conduct and push Congress for privacy legislation received mostly positive reviews, although some privacy advocates questioned whether companies would be too involved in writing the rules. Read More

Hacker steals one million user logins from YouPorn website
A million logins for the hugely popular YouPorn sex site appear to have been leaked after a hacker chanced upon a URL linking to a user list apparently left exposed for several years. Read More

Products of the week 2,20,12
Our round-up of intriguing new products from HP, Norton, Symantec among others. Read More

How to Build Multiple Layers of Security for Your Small Business
The complex and ever-changing security landscape can befuddle small businesses, and the plain truth is that there is no silver security bullet. Small businesses would be well-advised to deploy a multi-faceted security strategy. Here are eight must-have checklist items. Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPad 3 rumor rollup for the week of Feb. 21
  2. Apple's 30th birthday salute to Steve Jobs knocked off YouTube
  3. Cisco: Customers drove us to block Microsoft/Skype
  4. OK Cisco, we get it
  5. Extreme ships 192-port 40G Ethernet switch
  6. Air Force abruptly scraps iPad plan for special ops
  7. FCC chairman calls on ISPs to adopt new security measures
  8. Ubuntu Android add-on designed to replace PCs
  9. Battle of the cheap tablets: Nook Tablet vs. Kindle Fire
  10. The Windows 8 quiz

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: