Search This Blog

Friday, December 21, 2012

15 (FREE!) security tools you should try

  Single sign-on moves to the cloud | FCC issues security guidance to smartphone users
 
  Network World Compliance

Forward this to a Friend >>>


15 (FREE!) security tools you should try
Read More


RESOURCE COMPLIMENTS OF: AT&T

Are you ready for cloud services?
If you're thinking about cloud services for your organization, ask yourself this question: Are you ready? According to Forrester Research, Inc., that's the most important thing to consider before moving forward with your cloud initiatives. That's why we'd like to offer you a complimentary copy of the Forrester report: Assess Your Cloud Maturity. Get the report now to start planning your cloud services strategy.

In this Issue


WHITE PAPER: Quest

Protect Unstructured Data on File Servers, SharePoint & NAS
Unstructured data is a critical security risk and compliance concern for organizations. Your company's emails, documents and spreadsheets contain readily digestible, business-critical information, and your organization is generating more, much more, of those documents every day. How are you protecting that data? Read Now!

INSIDER
Single sign-on moves to the cloud
We are awash in passwords, and as the number of Web services increases, things are only going to get worse. Trying to manage all these individual passwords is a major problem for enterprise security. Many end users cope by re-using their passwords, which exposes all sorts of security holes. Read More

FCC issues security guidance to smartphone users
The U.S. Federal Communications Commission is advising smartphone users on how to protect their mobile devices and data from mobile security threats. Read More

5 tips to retain great security talent
You want the best on your security team. And once you've got them, you want to keep them happy and keep them in your organization. Read More

McAfee Inc. takes reputation beating after founder fled police
In the wake of his Belize neighbor's unsolved murder, John McAfee's lurch through the news damaged the reputation of his namesake, the security company McAfee Inc., a brand expert said Thursday. Read More

VMware patches 'critical' vulnerability
VMware has issued a patch for its VMware View product that fixes a security vulnerability that could allow an unauthorized user to access system files. Read More


WHITE PAPER: Quest Software

5 Questions for Buying a 2-Factor Authentication Solution
You've decided to implement two-factor authentication, but how do you know which solution is right for your organization? In this brief, discover the top five questions that you should ask before purchasing a two-factor authentication solution, and how Dell's solution addresses each question. Read Now!

33 Best & Worst Celebrity Tech Moments of 2012
Playing Steve Jobs, Gaga over social networking and more tech endorsements than you can shake an iPhone at Read More

Dell buying data-protection vendor Credant
Dell has made a deal to acquire data-protection vendor Credant Technologies and plans to add the company's technology to its enterprise IT security offerings. Read More

Linux servers targeted by new drive-by iFrame attack
A new Linux iFrame attack has been spotted, this time one attempting to infect its victims with the Zeus/Zbot bank login stealer, security firm ESET has reported. Read More

DOJ to use prosecutorial powers in state-sponsored cyberespionage
The Department of Justice (DOJ) plans to throw its prosecutorial weight behind efforts to stem the growing number of foreign government-sponsored cyberattacks against U.S. companies and government agencies. Read More

Add-on that forces HTTPS for popular websites released for Internet Explorer
Cloud-based security services provider Zscaler has released an implementation for Internet Explorer of the HTTPS Everywhere browser security extension. Read More


WHITE PAPER: Trend Micro

Solution Path: Threats and Vulnerabilities
This solution path helps Gartner clients develop a strategy and program for managing threats and vulnerabilities in their IT environments. Read Now

World of botnet cybercrime paying pretty well these days
The world of cybercrime is getting more specialized as an eco-sphere of helpers in running botnet operations has developed, according to one security researcher who spent over a year monitoring online forums and communities. Read More

SANS NetWars tests cybersecurity pros against peers
Organizers played "Eye of the Tiger" and "We are the Champions" over the loudspeakers as participants in the SANS Institute's NetWars Tournament of Champions sat down at their laptops and prepared for action. Read More

The mobile game changer
How smartphones and tablets are forcing CSOs to approach ID and access management differently Read More

With blue-chip backing, joint venture firm looks to embed crypto technology in mobile devices, electronic payments
The London-based firm Trustonic made its official debut today to provide crypto-based technology for use in chips for a wide variety of purposes, including enterprise security such as VPNs, mobile-device security, payment services, and control over how content can be delivered for entertainment. Read More

BlackBerry blacklists the 'Pooh' gang
A report surfaced recently contending that BlackBerry OS 10 will include a list of 106 prohibited passwords designed to prevent the clueless from choosing the likes of 123456, blackberry, or the ever-popular "password" as their password. Read More

 
 
 

SLIDESHOWS

10 technologies that disappointed in 2012
Here are 10 technologies that fell short of expectations in 2012.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Boeing uses 20,000 pounds of potatoes to check aircraft wireless network signals
  2. Cisco sacrificing one for another?
  3. World of botnet cybercrime paying pretty well these days
  4. Citrix: What kind of company is it anyway?
  5. Readers deserved to know of Google's supporting role
  6. 15 free security tools you should try
  7. How removing 386 support in Linux will destroy the world
  8. 7 technologies poised for failure in 2013
  9. Riverbed announces three releases for the Steelhead Mobile Controller appliance
  10. 10 of the most useful cloud databases
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: