Search This Blog

Wednesday, March 14, 2012

Apple's Lion Is a Resource and Security Nightmare

7 hot security companies to watch | NASA, General Motors team to build robotic glove for human hands

Network World Security

Forward this to a Friend >>>


Apple's Lion Is a Resource and Security Nightmare
As the Mac starts to make inroads back into the enterprise, Apple faces a major problem -- one that roars like a Lion. Its current operating system is a disaster from an IT management perspective. Read More


WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

WHITE PAPER: IBM

Best Practices to Architect Applications in the IBM Cloud
It's clear that cloud environments are a great way to deliver software—but what are the best ways to use it really well? Read this report to learn how to leverage cloud environments, design applications for successful cloud-based deployments and safeguard your virtual machines. Read Now

7 hot security companies to watch
There's a rush in security startups looking to tackle everything from identity management to encrypting cloud data. Here are some of the latest companies worth keeping an eye on. Read More

NASA, General Motors team to build robotic glove for human hands
NASA and General Motors today said they were developing a robotic glove humans can use to prevent or reduce the risk of repetitive stress injuries. Read More


WHITE PAPER: GFI Software

GFI VIPRE Antivirus Business 5.0
This free fully-functioning 30-day trial of GFI VIPRE Business is designed to optimize overall performance by melding antivirus and antispyware together into one powerful engine. Learn More

Throwing a Wrench & White Noise in Gov't Surveillance?
To celebrate Sunshine Week and government transparency, would you be interested in creating some "white noise" in Homeland Security monitored social media? Theory has it that if enough people use these hot NOC keywords that it might cause a few problems for the unblinking eye of Homeland Security surveillance. It remains to be seen if enough "chatter" would cause the people behind the spying eyes migraines... Read More

Apps For Security: Open Source Meets Crowd-sourcing
Read More


WHITE PAPER: Oracle

Copying Sensitive Data Into Non-Production Environments
Download this paper to learn data masking best practices and enable your organization to safely use production data for development, testing, and sharing with out-source or off-shore partners, without risking a sensitive data breach. Learn More!

The Many Synergies of Dell's Acquisition of SonicWall
You have to give Dell a lot of credit. As the company recognized changes in the industry, it was willing to move beyond efficient PC/server manufacturing and distribution into new technologies and labor-intensive services. In my domain, this led to the acquisition of SecureWorks and Force10. Today, Dell took another step into end-to-end solutions by grabbing security veteran SonicWall. Read... Read More

US military shows off non-lethal heat-beam for crowd control
It has an innocent enough sounding name -- Active Denial System -- that belies what it is actually doing: firing electromagnetic radiation at a frequency of 95 GHz toward a crowd making individuals feel an intense painful burning sensation on their skin but without actually burning it. People just want to run away. Read More

Identity theft reporting system needs improvements, victims say
Unwanted pressure to buy protection services from credit reporting agencies and the inability to speak to a live person when reporting an identity theft situation were the two most annoying issues victims identified in a Federal Trade Commission report issued on the growing problem this week. Read More

Cybercriminals bypass e-banking protections with fraudulent SIM cards, says Trusteer
Cybercriminals are impersonating victims in order to obtain replacement SIM cards from their mobile carriers, which they then use to defeat phone-based Internet banking protections, security vendor Trusteer said in a blog post. Read More



SLIDESHOWS

Useful security threat data advisory tools
Check out these browser-based tools to keep up on the latest cyber security threats.

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. 10 ways to celebrate Pi Day
  2. 7 hot security companies to watch
  3. Duqu Trojan contains unknown programming language
  4. Cisco rival Juniper put to the test
  5. iPad demand is "off the charts" according to Apple
  6. Firefox 11 slips onto stage ahead of schedule
  7. Review: HP, IBM, CA deliver highly scalable network management suites
  8. DARPA wants on-demand satellite imagery for smartphones
  9. Hackers shame IE9, Chrome, Firefox in Pwn2Own & Pwnium
  10. 5 signs you've lost control over your cloud apps

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: