Search This Blog

Tuesday, December 24, 2013

The biggest Internet security challenges of 2013

What's Microsoft going to look like after Ballmer? | Report on NSA 'secret' payments to RSA fuels encryption controversy

Network World Security

Forward this to a Friend >>>


The biggest Internet security challenges of 2013
From the attack on privacy and Cryptolocker to Eric Snowden and the NSA, it's been a challenging year Read More


WEBCAST: Solutionary, Inc.

Information Security: Options for Threat Detection
This webcast will identify the pros and cons of an on-premise SIEM and an MSSP approach, as well as provide an overview of financial, operational and organizational considerations that purchasers of security solutions may wish to consider. Learn More.

WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

What's Microsoft going to look like after Ballmer?
Like a juggler walking away with dozens of objects suspended in the air, Steve Ballmer is leaving his successor at Microsoft not only a tough act to follow but an even tougher act to continue. Read More

Report on NSA 'secret' payments to RSA fuels encryption controversy
The U.S. National Security Agency (NSA) paid US$10 million to vendor RSA in a "secret" deal to incorporate a deliberately flawed encryption algorithm into widely used security software, according to a Reuters report that is reigniting controversy about the government's involvement in setting security standards. Read More

Bah humbug. IT pros expect to work over holiday break
This year, 46% of IT pros will be on-call over the holidays to troubleshoot network, security and application problems, according to net management vendor Ipswitch. Read More


WHITE PAPER: Fortinet

Key Security Considerations for the Data Center
Your Data Center firewall security will soon need to support throughput over 100Gbps. John Grady, in an IDC Analyst Connection answers key questions regarding protecting the heart of the Enterprise. Learn more >>

"Minority Report" meets PC support
In the 2002 sci-fi flick Minority Report, the so-called "pre-cogs" could supposedly predict crimes before they actually occured. In 2013, Dell claims its technical support opereations can predict product failures before they occur. Read More

The weirdest, wackiest and coolest sci/tech stories of 2013
From bathroom malware and the mystery Google barge to Chinese Moon landings and humanoid robots it has been one wacky high-tech year Read More

10 mistakes companies make after a data breach
Michael Bruemmer, vice president of Experian Data Breach Resolution, outlines some the common mistakes his firm has seen as organizations deal with the aftermath of a breach during a presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy. Read More


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

'PGP' encryption has had stay-powering but does it meet today's enterprise demands?
PGP encryption, as industry old-timers know, started out as "Pretty Good Privacy" invented by Phil Zimmermann in 1991, and since then, was sold on to various corporate owners until it ended in the hands of Symantec in 2010. While it is a widely used vintage brands, does PGP public-key encryption still meet today's enterprise demands, given the rise of cloud computing and mobile? Read More

Older Mac webcams can spy without activating warning light, researchers find
Most webcams have a warning light that indicates when they're active, but it's possible for malware to disable this important privacy feature on older Mac computers, according to research from Johns Hopkins University (JHU) in Baltimore. Read More

IBM earns patent for 'encrypted blobs'
IBM said it's received a patent for an innovative data-scrambling technique known as "fully homomorphic encryption" that allows processing of encrypted data without having to decrypt it first. Read More

5 strategies for post-holiday BYOD problems
Christmas is fast approaching. Now, and after the office is back to normal after the first of the year, employees are going to return with several shiny new gadgets, along with the expectation that they'll "just work" in the corporate environment. Security will be a distant afterthought, because it's still viewed as a process that hinders productivity. Read More

5 Tips to Keep Your Data Secure on the Cloud
The number of personal cloud users increases every year and is not about to slow down. Back in 2012 Gartner predicted the complete shift from offline PC work to mostly on-cloud by 2014. And it's happening. Read More


SLIDESHOWS

10 best Android smartphones of 2013

2013 was a big year for the Android smartphone ecosystem.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 best Android smartphones of 2013

2. Report on NSA 'secret' payments to RSA fuels encryption controversy

3. Inside knowledge likely in Target breach, experts say

4. 10 ex-Cisco employees making an impact in the industry

5. 'PGP' encryption has had stay-powering but does it meet today's enterprise demands?

6. Juniper vs. Palo Alto Networks: Firewall court battle set to begin

7. What's Microsoft going to look like after Ballmer?

8. Notable deaths of 2013 from the worlds of technology, science & inventions

9. Bah humbug. IT pros expect to work over holiday break

10. Cisco teams with VMware, Citrix to counter Amazon's new cloud-based desktop


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: