Search This Blog

Wednesday, March 21, 2012

DARPA wants the ultimate technology, sensor network to monitor the vast Arctic

Is EVERYTHING made in China? | Symantec to acquire Nukona to assist in BYOD strategy

Network World Security

Forward this to a Friend >>>


DARPA wants the ultimate technology, sensor network to monitor the vast Arctic
Talk about an ambitious project. The scientists at the Defense Advanced Research Projects Agency said today they want to develop a massive system of sensors and unmanned systems that can monitor and track the remote environment of the Arctic. Read More


RESOURCE COMPLIMENTS OF: Microsoft

Try Microsoft Office 365, free
Collaborate in the cloud with Office, Exchange, SharePoint, and Lync videoconferencing. Access, edit, and share documents. Starting at $8/user/month. Try it free.

WHITE PAPER: IBM

Best Practices to Architect Applications in the IBM Cloud
It's clear that cloud environments are a great way to deliver software—but what are the best ways to use it really well? Read this report to learn how to leverage cloud environments, design applications for successful cloud-based deployments and safeguard your virtual machines. Read Now

Is EVERYTHING made in China?
What do high-tech and sex dolls have in common? Both are made by the ton in China Read More

Symantec to acquire Nukona to assist in BYOD strategy
ymantec today announced it has reached an agreement to acquire privately held Nukona, a maker of mobile application management software, for an undisclosed price. Read More

Cybersecurity Bill Soap Opera
It's been about a month since I last blogged about cybersecurity legislation so here's a brief review of where we stand. Read More


WHITE PAPER: SonicWALL

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

Doing the security-card butt-bump
We've just been handed new security cards for access to our office and when rummaging through my wallet to return the old one I realized that I didn't even remember what it looks like. Reason is that I've never had to take it out to gain entry. Instead, I would always do one of two things: Waive my wallet at the sensor. Or do the security-card butt-bump. You say you're unfamiliar with this butt-bump?... Read More

IBM-Texas settle contentious data center consolidation spat; Xerox to step in
Looking to avoid what would have been a costly and likely lengthy court battle IBM and the state of Texas's Department of Information Services have apparently agreed to disagree over a failed $863 million data center consolidation pact. Read More

IT Professionals Lack Confidence in the Security of Their Systems
Results of a new survey speak to the inadequacies of corporate security measures as well as the persistence of ever-growing security threats. Read More


WHITE PAPER: Tripwire

Responding to New Threats in More Complex IT Environments
As organizations today face the challenge of protecting their valuable data, they must balance that protection with giving business users and customers access to the data. Learn More!

It's a Great Time to be Looking for an IT Security Job
24 percent of companies say they didn't have a computer security incident last year. Who are these people? Read More

Developers say application security lacking
Are enterprise applications really secure? It depends on whom you ask. Read More

Duqu Trojan mystery programming language identified as "old school" C
The Duqu Trojan which some believe is a relative of the Stuxnet worm used to attack Iran was partly programmed in Object-Oriented C (OOC) by a traditional "old school" enterprise programming team, Kaspersky Lab researchers have concluded. Read More



SLIDESHOWS

Review: Android-based Wi-Fi stumblers
Four easy-to-use wireless management and security tools that cost under $2.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. FAA 'exploring' use of devices like iPad during flights
  2. Stolen encryption key the source of compromised certificate problem, Symantec says
  3. Which smartphone apps are the biggest data hogs?
  4. New iPad sales already top 3 million
  5. 'Surprise' Mac app quickly configures iOS devices
  6. Cisco incubating software-defined network startup?
  7. Don't wait on this patch, Microsoft says
  8. Secret Service takes out "astonishing" cyber theft ring
  9. How much traffic does streaming video streaming generate?
  10. Cell-to-Wi-Fi roaming is on the way, but may come with a price

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: