Tuesday, February 28, 2012

MIT takes aim at secure, self-healing cloud

Quick look: Silicon Valley's wicked young CEOs | What's hot at RSA 2012

Network World Security

Forward this to a Friend >>>


MIT takes aim at secure, self-healing cloud
What if a cloud computing infrastructure could recognize a cyberattack, eliminate it and never stop working while all that is being done? That's what researchers at MIT, with help from the federal government, are investigating the feasibility of. Read More


RESOURCE COMPLIMENTS OF: Cisco

Join Cisco at RSA Conference
Is your network secure for today's needs? At this year's RSA Conference, Cisco invites you to learn how the Cisco SecureX security framework can help solve your organization's biggest security challenges--from BYOD to the move to virtualization and cloud computing and stopping today's most sophisticated and persistent threats. Don't Miss Our Keynote at the 2012 RSA Conference, February 29 at 3:10pm P.T. with Cisco SVP Christopher Young and his session, "Lock It Down or Free It Up?". Click here for details and a complete list of Cisco's RSA event activities

RESOURCE COMPLIMENTS OF: Webroot

Webroot® Unveils SecureAnywhere™ Business
Change the economics of your security with Webroot® SecureAnywhere™ Business - Endpoint Protection: the fastest, lightest, easiest-to-manage security. It redefines accurate identification and effective prevention of malware, while always being up-to-date and giving full control over all endpoints. Webroot is taking the misery out of security. Click to continue

Quick look: Silicon Valley's wicked young CEOs
Silicon Valley youngsters get lots of money for new, innovative Internet companies Read More

What's hot at RSA 2012
Read More

Mobile network operators set guidelines for app privacy
Amid growing concerns over the privacy policies of mobile phone apps, the GSMA has published a set of guidelines that aims to give users more transparency, choice and control over how apps use their personal information. Read More


WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

Cloud Security Alliance launches innovation program, eyes mobile threats and solutions
At this year's summit, the CSA announced their latest initiatives, which include examining ways to better secure mobile devices through cloud computing, looking at ways to drive more security innovation, and a concerted push into the Asia-Pacific region. Read More

New Mac malware exploits Java bugs, steals passwords
A new version of a well-known family of Mac malware exploits vulnerabilities in Java to steal usernames and passwords for online payment, banking and credit card websites. Read More

How to protect your online privacy
Google's new privacy policy can by confusing, so here are clear steps to take to protect yourself online Read More


WHITE PAPER: NetIQ

5 Things You Need to Know About Disaster Recovery Planning
Download this short, easy-to-digest Disaster Recovery eBook today. It's packed with unique planning approaches to make your data center less vulnerable to natural and man-made disasters. Warning, side effects may include reduced stress levels. Learn More!

Trend Micro overhauls threat-detection product, returns it to customer premises
Trend Micro today announced Deep Discovery, a threat-detection tool designed to monitor network traffic in order to detect signs of stealthy attacks aimed at stealing corporate data. Read More

Video Highlights from Mobile World Congress
Read More

Fixmo will block corporate apps on compromised mobiles
Fixmo, a company that started out developing tools for the U.S. National Security Agency, is offering a new product that will automatically shut down corporate applications on compromised iOS and Android devices. Read More

Better information sharing is the future of security, experts say
After having founded a software security company, selling it to HP and then working for them, Roger Thornton gained valuable insight into the evolving IT security threat landscape. So, naturally, he left HP and took on a new role in an entirely different sector, where he is taking part in an initiative that aims to bring the security community to new levels of information sharing. Read More

CA offers new disaster recovery option
CA Technologies has launched a disaster-recovery software-as-a-service offering that combines on-site data protection with a cloud-based service, using Microsoft Azure's infrastructure. Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. IBM's molecular images may help nanoscale circuits
  2. 6 things you need to know about Google's new privacy policy
  3. The crime of selling used video games
  4. Giving up your iPhone
  5. A 1985 gift to Jobs meets 2012 copyright law
  6. Cisco bounces back
  7. iPhone 5 rumor rollup for the week ending Feb. 24
  8. Network operators get serious about Wi-Fi
  9. Cisco buys optical company for $271 million
  10. Cisco Q4 Ethernet switch revenue up, HP's down

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment