Search This Blog

Wednesday, May 09, 2012

BlackBerry 10 OS will have multi-layered security model

Mobile BYOD users want more security | DHS: Gas pipeline industry under significant ongoing cyberattack

Network World Security

Forward this to a Friend >>>


BlackBerry 10 OS will have multi-layered security model
RIM's upcoming BlackBerry 10 operating system is intended to be as secure, if not more so, than the OS running on RIM's current crop of BlackBerry devices. Mobile security could become a major selling point for the new platform, for enterprises, carriers and end users alike. Read More


WHITE PAPER: FireEye

CISO Guide to Next Generation Threats
To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive and real time. Read more!

WHITE PAPER: Fortinet

Next-Generation Security for Enterprise Networks
Since the concept of a 'next-generation firewall' was introduced several years ago by Gartner, many network security vendors have introduced their own next-generation firewalls to address this product category - but with varying results. View Now

Mobile BYOD users want more security
A survey of more than 4,000 mobile-device users and IT professionals shows wildly abundant use of mobile devices, but profound concerns about security and how employee-owned devices ought to be used for business purposes. Read More

DHS: Gas pipeline industry under significant ongoing cyberattack
There is now an ongoing and massive cyberattack targeting the American gas-pipeline industry, aimed at giving the attacker a way to gather sensitive information by compromising business systems and possibly even subverting industrial control systems. The Department of Homeland Security's investigative division, called the ICS-CERT, says it's taking the somewhat unusual step of issuing an alert and speaking publicly about it to heighten awareness of a dangerous situation. Read More


WEBCAST: IBM

Accelerate Document Processing and Wow Your Customers
Learn how intelligent imaging and BPM solutions, coupled with pragmatic best practices and methodology, can improve productivity, lower cost, increase accuracy, reduce cycle times and lower overall risk. Learn More

Free fraud protection scam delivers financial malware
In a new twist on FUD (Fear, Uncertainty, Doubt), a piece of financial malware called Tatanga, an online banking Trojan horse first discovered in May 2011, is promising security products to gain access to confidential personal information to steal identities and money. Read More

Security error in OS X 10.7.3 exposes passwords for legacy FileVault users
A security error in OS X 10.7.3 exposes passwords on systems with support for the pre-Lion FileVault home-directory encryption feature. This security flaw, apparantly created when Apple left debugging code in the 10.7.3 update, is only triggered with Lion systems in which legacy support for the original FileVault is retained and when logging in with such an account. Read More


WHITE PAPER: Check Point Software

Check Point 3D Security Analysis Report Tool
Reduce security risks with the Check Point 3D Security Analysis tool. This comprehensive security analysis provides an easy-to-read report that summarizes security events, their risks, and remediation. See sample report View Now

Symantec conference puts focus on mobile security
At its annual Symantec Vision conference attended by enterprise customers and business partners, Symantec laid out its management and security product strategy for mobile endpoint devices, including the iPhone, iPad and Google Android devices. Read More

Cisco offers API to fight call fraud
Cisco this week at Interop 2012 released an API for its branch routers designed to enable third-party developers to write applications to enhance the security of phone calls over the router network. Read More

Who are tech's highest paid CEOs?
Oracle's Larry Ellison has been the highest paid tech chief on our list each year since Network World started tracking CEO compensation, but in 2011 his $77.6 million pay package was bested by another tech CEO's enormous windfall. Who was it? Read More

BeyondTrust acquires eEye in union of security vendors
BeyondTrust, a software firm that specializes in identity and access management for the enterprise, has announced the acquisition of eEye Digital Security, which makes products for vulnerability management, patch remediation, malware defense and configuration compliance. Read More



SLIDESHOWS

Who are tech's highest paid CEOs?
Oracle's Larry Ellison finally ousted from the top spot on our list of highest paid tech execs.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Who are tech's highest paid CEOs?
  2. Cisco nemesis Huawei to demo 96-port 100G Ethernet switch
  3. Alcatel-Lucent brings 40G to the core
  4. How to fight back against privacy pirates
  5. 12 cool, creative and just plain weird gadget concepts
  6. Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
  7. Next-gen firewalls: Off to a good start
  8. John McAfee, antivirus pioneer, arrested by Belize police
  9. Why Linux is a desktop flop
  10. iPhone 5 with larger screen and thinner form factor on the horizon

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: