Search This Blog

Tuesday, February 14, 2012

The Intersection of Security Intelligence and Big Data Analytics

Network World Security - Newsletter - networkworld.com
Cisco's John Stewart on the latest security threats … and what enterprises can do to fight back | H.R. 1981, the jaws of law will eat your Internet rights

Network World Security

Forward this to a Friend >>>


The Intersection of Security Intelligence and Big Data Analytics
It's official, the security industry has jumped on the "big data" bandwagon with both feet. How do I know? Well, I'm participating in a panel discussion on this topic at RSA and I believe there are 2 other sessions on the topic. I guess anyone headed to San Francisco later this month should be prepared to get a big dose of big data. While lots of the rhetoric around RSA will be just that,... Read More


WHITE PAPER: Shoretel

Comparison of Avaya and ShoreTel UC Solutions
Whether you need to build a business case for a UC system, or are ready to select a new solution, this white paper offers a thorough, side-by-side comparison of ShoreTel and Avaya offerings to help you make informed decisions. Read now!

In this Issue


RESOURCE COMPLIMENTS OF: Palo Alto Networks

Gartner Magic Quadrant Exclusive Report
Palo Alto Networks was named leader for Enterprise Network Firewalls. According to Gartner, vendors in the leaders quadrant "lead the market in offering new safeguarding features, providing expert capability, rather than treating the firewall as a commodity, and having a good track record of avoiding vulnerabilities in their security products." Click to continue

Cisco's John Stewart on the latest security threats … and what enterprises can do to fight back
Freelance writer Susan Perschke recently sat down with Cisco Vice President and Chief Security Officer John N. Stewart for an in-depth discussion of the state of enterprise security. Read More

H.R. 1981, the jaws of law will eat your Internet rights
Like the great white in Jaws there's proposed legislation about to strike and it's your liberties that will have a chunk missing Read More

NASA unplugs last mainframe
It's somewhat hard to imagine that NASA doesn't need the computing power of an IBM mainframe any more but NASA CIO posted on her blog today at the end of the month, the Big Iron will be no more at the space agency. Read More

Hackers probably stole Steam transaction data, Valve says
Valve has informed users of its Steam online game distribution platform that hackers have probably downloaded encrypted credit card transaction data from a backup database during an intrusion last year. Read More


WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

Microsoft Store in India hacked, user data leaked, passwords stored in plain text
The Microsoft Store India was hacked by Evil Shadow, a team of Chinese hackers who left a "black page" (http://www.microsoftstore.co.in/evil.html) tagged with, "Unsafe system will be baptized." But the hack goes well beyond a defacement into embarrassment. Read More

The Byte - Microsoft hacked, Apple asks for inspection, White House CTO resigns, FCC maps broadband
The Byte, Feb. 13, 2012Microsoft's online store in India is hacked by EvilShadow team.Apple asks the Fair Labor Association to inspect Foxconn.White House CTO Aneesh Chopra resigns from the nation's top technology post.And more. Read More

Mozilla patches critical Firefox bug
For the third consecutive release of Firefox, Mozilla has pushed users a patch shortly after launching a new version of the browser. Read More

Let the games begin: NASA political budget pong opens at $17.7 billion
If this year is like the recent few, hunting season on NASA programs started today when the White House submitted its 2013 budget which included a $17.7 billion piece for NASA - an almost $60 million reduction from last year's contentious budge Read More


WHITE PAPER: Raritan

Data Center Transformations
This paper discusses ways to simplify data center transformation and introduces a new process – BOCA – Build Outs, Consolidations and Acquisitions. Learn the five stages of BOCA and see how the right remote access and IT infrastructure management tools, deployed early and continuously monitored, can dramatically improve overall efficiency. Read now!

Google clamps down on its pre-paid Google Wallet card on smartphones
Google said it has temporarily disabled the provisioning of its prepaid Google Wallet cards used in some NFC-ready phones. Read More

How does mobile device management (MDM) work?
Enterprise IT and security teams are stretched thin by the growing number of mobile device types invading the enterprise -- many owned by employees -- the variety of OSs and the sheer volume of mobile apps users are requesting. Questions abound. Read More

Continuous Transaction Monitoring (CTM) protects financial integrity, even when network security inevitably fails
Everyone's seen the headlines. TJX. RSA. Playstation Network. Symantec. Major corporations with massive investments in network security reduced to public ridicule and expensive liability by hackers. Even governments aren't immune, as proven by online vigilantes like Wikileaks and Anonymous. Read More

Building an IDPS without big iron
Companies seeking to deploy intrusion detection and prevention systems (IDPS) for network security have traditionally had to rely on proprietary appliances that cost from $15,000 to $50,000. That puts IDPS out of reach for many small to midsize companies, but SaaS-based alternatives might fit the bill. Read More

Is your definition of security holding you back?
Hunched forward in an effort to find comfort in old, wooden chairs gathered around a whiteboard in an oversized conference room, the ten people sitting before me each clutched a single sheet of white paper in one hand, a pen in the other. Read More

Police warn of money-stealing computer virus
The Metropolitan Police is warning the public to be aware of a computer virus that impersonates its e-crime unit in an effort to steal money from unsuspecting users. Read More



SLIDESHOWS

Firefox faceoff: Nightly vs. Pale Moon vs. Waterfox
Three unofficial Firefox variants take advantage of 64-bit processors and 64-bit version of Windows 7.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. SNL skit busts on Verizon, 4G & LTE
  2. First look: Cisco Cius
  3. How to really bury a mainframe
  4. No, Wikipedia has not forgiven GoDaddy for backing SOPA
  5. Hottest iPad 3 design concepts
  6. Much of western U.S. is a 3G wasteland, says FCC
  7. Boston police use video to laugh in hacking group Anonymous' face
  8. Hadoop wins over enterprise IT, spurs talent crunch
  9. Valentine's Day Google Doodles through the years
  10. iPhone 5 rumor rollup for the week ending Feb. 10

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: