Search This Blog

Friday, January 27, 2012

6 security companies to watch

Hacking stunt: Stealing smartphone crypto keys using plain old radio | 15 worst Internet privacy scandals of all time

Network World Security

Forward this to a Friend >>>


6 security companies to watch
This group of security companies includes several that want to capitalize on technology ideas that were originally devised to serve communities of special interest but could now take on a wider cybersecurity role. Fixmo, for example, has its roots in the National Security Agency where its mobile security makes it possible to run critical applications in sandboxes that are insulated from the rest of the machine, making them less likely to fall victim to malware that might have infected the device. Read More


RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
CloudPassage Halo is the award winning cloud server security platform that has everything you need to secure your cloud servers - from dynamic firewalls to intrusion detection, and account management. Halo is SaaS and installs in 5 minutes. Halo Basic is free for up to 25 servers. Try Halo

WHITE PAPER: CA Technologies

Tackling the New Normal: Unified Infrastructure Management
The new normal for IT is change; and it's up to you to keep pace with that change. You need to leverage innovations—like cloud and mobility—with a cohesive approach to management that ensures full visibility and control across the infrastructure. Learn More

Hacking stunt: Stealing smartphone crypto keys using plain old radio
Encryption keys on smartphones can be stolen via a technique using radio waves, says one of the world's foremost crypto experts, Paul Kocher, whose firm Cryptography Research will demonstrate the hacking stunt with several types of smartphones at the upcoming RSA Conference in San Francisco next month. Read More

15 worst Internet privacy scandals of all time
In honor of National Data Privacy Day this Saturday, Jan. 28, we've put together a list of the 15 worst Internet privacy scandals of all time. Read More

Hot security upstarts
Offering new email security technology and services to help clean up after a breach, these new companies are leading a wave of hot security startups Read More


WHITE PAPER: Bradford Networks

(BYOD) Unleashed in the Age of IT Consumerization
IT departments need to understand what devices are trying to connect to their networks, so they can provide convenient, secure access to those that are authorized, including personal iPads and smartphones. This white paper explains how IT departments can implement a practical and secure strategy and offer the convenience mobile devices provide. Read more

EU data protection proposes big fines for businesses
The European Commission announced a data protection bill this week that it hopes will safeguard citizen's online privacy. Read More

Data Privacy Day: Social media 'private' data is fair game for e-discovery in court
This Saturday, Jan. 28, is Data Privacy Day and it would be a great time to ponder our cyberculture, how much you share online and how well you manage your online reputation. In an increasingly connected world, everything people do online, from emailing, texting, uploading photos, making purchases online, to clicking the "like" and "retweet" buttons on favorite web pages, all contribute to their online... Read More

Are we winning the cyber security war?
In the cat and mouse game that is enterprise security, it is hard to determine who has the upper hand, so we put the question to two experts. Give their arguments a read, vote on the position you most agree with and add your thoughts in the forum. Read More


WHITE PAPER: Quantum

Big Data: Managing Explosive Growth
Are you experiencing a data explosion? The trend toward leveraging Big Data for competitive advantage helps IT professionals successfully meet business goals. Learn how to reliably manage, store and access vast amounts of archived data while protecting it and keeping costs low. View Now

Symantec recommends disabling pcAnywhere and waiting for security patches
Security vendor Symantec has advised users of its pcAnywhere remote control software to disable it, because hackers with access to the product's source code could exploit security holes identified in the application. Read More

Google stirs up privacy hornet's nest
Google has whipped up a privacy brouhaha with a blog post announcing that the company is rewriting its privacy policy, consolidating user information across its services. Read More

A vision for secure mobility management in the enterprise
There's been a lot of buzz lately about secure mobility in the enterprise, but often the focus is on just one or two aspects of the entire mobile device security landscape. While malware protection, mobile device management (MDM) and VPN are certainly valuable tools in protecting mobile devices, each of these strategies alone can provide only partial protection. And in a bring your own device (BYOD) corporate environment, the risks of "only partial protection" can be quite large. Read More

A quick look: The Megaupload Kim Dotcom hullabaloo
Megaupload.com's CEO Kim Dotcom is at the center of file sharing website's battle with the US over copyright, pirating and money laundering charges Read More



SLIDESHOWS

2012's 25 Geekiest 25th Anniversaries
Network World's 6th annual collection of the year's "geekiest anniversaries" this time includes the births of pioneering companies such as UUNet and NEXTEL; technologies like OS/2 and SPARC; television classics topped by "Star Trek: The Next Generation" and the first "Simpsons" shorts; disposable contact lenses; the first naked-eye supernova in four centuries; and, who could possibly forget The Woodstock of Physics?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPad 3 rumor rollup for the week of Jan. 26
  2. Say goodbye to Fast Ethernet
  3. Threatened by Anonymous, Symantec tells users to pull pcAnywhere's plug
  4. Cloud activity to explode in 2012
  5. Inside Apple's secret packaging room
  6. Fear the tablet: Cisco survey
  7. Google looks to speed up the Internet
  8. 2012's 25 geekiest 25th anniversaries
  9. 10 cool car apps and gadgets
  10. Skype's new headquarters: a visual tour

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: