Search This Blog

Monday, December 23, 2013

'PGP' encryption has had stay-powering but does it meet today's enterprise demands?

Enterprise Security Professionals Offer Their Mobile Computing Security Advice | Tech hoaxes, scams, urban legends, and practical jokes

Network World Security

Forward this to a Friend >>>


'PGP' encryption has had stay-powering but does it meet today's enterprise demands?
PGP encryption, as industry old-timers know, started out as "Pretty Good Privacy" invented by Phil Zimmermann in 1991, and since then, was sold on to various corporate owners until it ended in the hands of Symantec in 2010. While it is a widely used vintage brands, does PGP public-key encryption still meet today's enterprise demands, given the rise of cloud computing and mobile? Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

WHITE PAPER: Savvis

Leveraging ITaaS to Fight Growing Cybersecurity Threats
Buying IT security as a managed service can provide your organization the hardware, software, infrastructure, and the expertise that you need to protect your business in today's complex and evolving threat environment. Learn how to maintain and grow your business in today's ever-changing threat environment and at a commodity price. Learn more

Enterprise Security Professionals Offer Their Mobile Computing Security Advice
In 2012, ESG research asked 315 security professionals working at enterprise organizations (i.e. more than 1,000 employees) about the impact of mobile computing on security management and operations. It turned out that the impact was pretty substantial, 30% of organizations say that mobile devices made security management and operations "much more difficult," while 32% say that mobile devices... Read More

Tech hoaxes, scams, urban legends, and practical jokes
You can't believe everything you read on the Internet. Yet so many people do! Read More


WHITE PAPER: Attachmate

The Need for Enterprise-Grade File Transfer
From email to Dropbox and FTP, the status quo of file transfer in most organizations is UFT—or Unmanaged File Transfer. That's the troubling finding of a 2013 survey conducted by Osterman Research. Read this paper to learn how enterprise-grade Managed File Transfer (MFT) can help. View Now

DDoS blackmailers branded 'playground bullies' for attack on casino firm
Two "sinister playground bullies" have been jailed for a brazen attempt to extort a 50 percent share of a Manchester-based online casino using the threat of DDoS attacks capable of taking the business offline. Read More

RSA keys snatched by recording CPU sounds with a phone
It sounds too preposterous for even James Bond: by placing a mobile phone next to a PC, researchers can "listen" to the faintest sound a CPU makes as it churns away on RSA-encoded content and extract the keys themselves. Read More


WHITE PAPER: HP and Intel® Xeon® processors

HP BladeSystem Leadership and Innovation for Data Centers
In Gartner's 2013 Blade Server Magic Quadrant, HP has been positioned as a leader for completeness of vision and ability to execute. Read this paper to learn why HP BladeSystem is the leading choice of IT professionals. Learn More

Quantum crypto, standard private key blended for first time
ID Quantique has found a way to blend quantum-key cryptography with more traditional crypto, the Advanced Encryption Standard (AES). The effect is to gain certain advantages offered by both for private-key-based encryption. Read More

BitTorrent develops secure, decentralized chat program using public-key crypto
BitTorrent, the company behind the popular file sharing protocol with the same name, is developing a secure chat application that will encrypt all communications between users and won't use any central server to route messages. Read More

Unique malware evades sandboxes
Malware utilized in the attack last month on the developers' site PHP.net used a unique approach to avoid detection, a security expert says. Read More

The weirdest, wackiest and coolest sci/tech stories of 2013
From bathroom malware and the mystery Google barge to Chinese Moon landings and humanoid robots it has been one wacky high-tech year Read More


SLIDESHOWS

Avaya builds massive Wi-Fi net for 2014 Winter Olympics

BYOD for 30,000 people creates extraordinary demands on the network.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Juniper vs. Palo Alto Networks: Firewall court battle set to begin

2. Gotcha! FBI launches new biometric systems to nail criminals

3. Target's statement to customers on massive data breach

4. Microsoft manager charged with insider trading

5. The iPhone 5s Quiz

6. Target says 40 million cards likely skimmed in security breach

7. Proposed California law would mandate smartphone kill switch

8. 10 best Android smartphones of 2013

9. Cisco teams with VMware, Citrix to counter Amazon's new cloud-based desktop

10. IBM earns patent for 'encrypted blobs'


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: