Monday, May 07, 2012

Intel-McAfee developing cloud-security strategy

How Real Is The Malware Threat To Android? | DARPA system to blend AI, machine learning to understand mountain of text

Network World Security

Forward this to a Friend >>>


Intel-McAfee developing cloud-security strategy
Intel, which last year acquired McAfee for its security expertise, today described work it is doing to provide enterprises with a way to secure data stored in public or hybrid cloud environments. Read More


WHITE PAPER: Fortinet

Next-Generation Security for Enterprise Networks
Since the concept of a 'next-generation firewall' was introduced several years ago by Gartner, many network security vendors have introduced their own next-generation firewalls to address this product category - but with varying results. View Now

WHITE PAPER: SonicWALL

NSS Labs Next-Generation Firewall Security Value Map
A whole new breed of Next-Generation Firewalls is here – designed to deliver powerful security, robust intrusion prevention and granular application control in the new Web 2.0 environment. But do all Next-Generation Firewalls deliver on this promise? Read now.

How Real Is The Malware Threat To Android?
Many of us have heard that our smartphones and tablets already are or soon will be the targets of attack by the malware industry (yes it is an industry). However, most of you probably don't have any security software running on your devices. Why is that? Read More

DARPA system to blend AI, machine learning to understand mountain of text
The Defense Advanced Research Projects Agency (DARPA) will next this month detail the union of advanced technologies from artificial intelligence, computational linguistics, machine learning, natural-language fields it hopes to bring together to build an automated system that will let analysts and others better grasp meanings from large volumes of tex Read More

IBM: The rapidly changing role of top security executives
Security issues are exerting a ton of pressure and monetary concerns on the executives in charge of keeping corporate networks and assets safe. Read More


WHITE PAPER: NetIQ

Simplify Compliance and Security
This introduction to NetIQ Sentinel Log Manager provides insight into a flexible and cost-efficient software appliance that lights a clear path to complete, real-time, identity-aware security information and event management. Learn More!

'Smishing' Attacks Are on the Rise
Text messaging is the most common non-voice use of a mobile phone. There are trillions of text messages received around the world each day, and an increasing number of them are spam, or phishing attacks of some sort. Read More

John McAfee, antivirus pioneer, arrested by Belize police
McAfee antivirus founder John McAfee is reportedly taking legal advice after a raid on his Belize home by police resulted in the software entrepreneur's arrest and the death of his pet dog. Read More

Email product looks to reduce spam false positives
A new product from TrustSphere is tackling the problem of email incorrectly flagged as spam, an irritating and potentially costly error for businesses. Read More


WHITE PAPER: Avaya

Fit-for-Purpose Data Center Networking
Find out why the technology of choice for creating the foundations of network transparency will be that of Shortest Path Bridging (SPB). SPB masks devices, links and protocols and delivers a logically extended Ethernet LAN that provides connectivity for multiple end points. Learn more advantages of SPB and why it is a superior choice over TRILL. Learn More

SOCA website still down after mystery cyber attack
The website of the UK's Serious Organised Crime Agency (SOCA) has been downed by what is starting to look like the most serious cyberattack ever to hit the site. Read More

Most Excellent Tech Toys from the '90s
Pining (or not) for Netscape Navigator, Super Nintendo and Tamagotchi Read More

Techiest 2012 commencement speakers
The Woz, Steve Jobs' biographer, IBM chair among those to share words of wisdom with new grads Read More

Oracle urges removal of older Java versions due to security risks
Company points users to latest Java update, with most recent features, fixes, and performance improvements Read More



SLIDESHOWS

7 reasons why Linux is a desktop flop
Writer Maria Korolov runs through all the reasons why Linux has not made any headway despite its many strengths.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 10 ways to celebrate Star Wars Day
  2. Samsung's Galaxy S III: four things to know
  3. Microsoft Researchers say cybercrime loss estimates are a bunch of bunk
  4. How to land a cybersecurity job
  5. Hottest IT skill? Cybersecurity
  6. Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
  7. The 10 worst Web application-logic flaws that hackers love to abuse
  8. Why Linux is a desktop flop
  9. Tech's 10 most famous college dropouts
  10. Step aside Anonymous, here comes The Unknowns

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment