Search This Blog

Wednesday, January 29, 2014

How to easily encrypt email with Virtru for free: Gmail, Hotmail, Outlook, Yahoo

Security professionals identify IT risks associated with cloud computing | VPN bypass vulnerability affects Android Jelly Bean and KitKat, researchers say

Network World Security

Forward this to a Friend >>>


How to easily encrypt email with Virtru for free: Gmail, Hotmail, Outlook, Yahoo
What better way to celebrate Data Privacy Day than to show you how to easily encrypt email and keep those emails both private and secure? Read More


WHITE PAPER: IBM

Pay-as-you-Grow Data Protection
IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions they need, and add new functionalities as they grow. Read Now

WHITE PAPER: HP and Intel®

START small, grow tall: Why cloud now
Executives and leaders look forward to the day when IT will be delivered as a pure service throughout the organization - available on demand much like electricity or water. Without a clear plan, organizations risk re-infecting their IT environments with complexity and sprawl. This paper will show you how to avoid these pitfalls. Learn More

Security professionals identify IT risks associated with cloud computing
ESG research point to lack of control, privacy, and lack of security visibility. Read More

VPN bypass vulnerability affects Android Jelly Bean and KitKat, researchers say
A vulnerability in Android allows malicious applications to bypass an active VPN (virtual private network) connection and force traffic from the device through an attacker-controlled system where it can be intercepted, according to security researchers from Ben-Gurion University of the Negev in Israel. Read More


WHITE PAPER: HP and Intel® Xeon® processors

Defining Data Services for Virtualizing and Automating IT
To respond to rapid business environmental changes, enterprises are now adopting a more agile and services-oriented model for centralized IT, often characterized as "private cloud." Read this Evaluator Group paper to learn how HP 3PAR StoreServ Storage platforms can be foundational to developing IT agility. Learn More

Understanding How SDN and NFV Can Work Together
As software-defined networking and network function virtualization begin to take hold in the enterprise, it's worth examining each concept to see how they complement each other. The end result: More generic network hardware and more open software. Read More

Retailer data breach trend not likely to end soon
Three major retail chains have recently admitted being victims of massive data breaches that compromised sensitive data from over 100 million customers. Sadly, though, Target, Nieman-Marcus, and Michael's are just the beginning of a trend that isn't likely to fade away any time soon. Read More


WEBCAST: Silver Peak Systems, Inc.

Combat Disasters And Optimize Business Operations
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication strategies and technologies. View now >>

Coca-Cola suffers data breach after employee 'borrows' 55 laptops
Coca-Cola has admitted falling prey to bizarre slow-motion data breach in which an employee apparently stole dozens of laptops over several years containing the sensitive data of 74,000 people without anyone noticing. Read More

Revised rules let Apple update law enforcement, national security data
Having perhaps fended off doom-and-gloom over its financials, Apple is now also confronting the doom-and-gloom over federal surveillance. The company on Monday updated the information it provided last November on U.S. law enforcement and national security requests for user data. Read More

Microsoft says law enforcement documents likely stolen by hackers
Documents linked with law enforcement inquiries appear to have been stolen in recent phishing attacks on certain employee email accounts, Microsoft said. Read More

Can TVs and refrigerators really spew botnet spam?
Refrigerators might hold spam to keep it cold in the meat bin. But in the Internet of Things world, can fridges connected to the Web blast malicious e-mail as part of a botnet? And how about TVs or other smart devices? In the stranger side of the Internet of Things, Proofpoint said it uncovered a cyberattack in which compromised refrigerators and TVs sent out malicious e-mail. But Symantec, says it saw no evidence of such an attack. Read More


SLIDESHOWS

FIRST LOOK: New Cisco Nexus switches

Cisco extends its Nexus data center switching line.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco puts enterprises under Insieme control

2. Old-school Wi-Fi is slowing down networks, Cisco says

3. Microsoft retains weapon to silently scrub XP

4. It's getting easier to steal your neighbors' unused Wi-Fi bandwidth

5. Amazon and Microsoft drop cloud storage prices by up to 50%

6. Cook admits Apple blew the call on the iPhone 5C

7. FIRST LOOK: New Cisco Nexus switches

8. Macbook Pro delivers blazing speed in Gigabit Wi-Fi test

9. 10 big myths about Big Data

10. 6 dirty secrets of the IT industry


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: