Search This Blog

Tuesday, August 14, 2012

Businesses should pressure software vendors to meet new Microsoft encryption requirements

The security game changes when the bad guys are backed by foreign governments | The Grill: ADP's CIO on the granddaddy of SaaS

Network World Security

Forward this to a Friend >>>


Businesses should pressure software vendors to meet new Microsoft encryption requirements
Businesses should start leaning on vendors now to upgrade applications that use less than 1024-bit encryption before it's too late. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant remote support with LogMeIn Rescue
With LogMeIn Rescue, you can start a support session in just 60 seconds. Connect 24/7 to PCs, Macs, smartphones and tablets. You'll get in, solve the problem and save the day without ever leaving your desk. Try it free today.

WHITE PAPER: Aerohive

The iEverything Enterprise
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time. Learn more.

The security game changes when the bad guys are backed by foreign governments
Fidelis Security Systems has an interesting perspective on the world of security, working, as it does, with the U.S. government to keep other countries from prying into some of our nation's most critical networks. Now that many of those same countries are after intellectual property housed by enterprise shops, commercial customers are knocking at Fidelis' door looking for help. Network World Editor in Chief John Dix talked to Fidelis CEO Peter George about the shifting threat landscape and what companies are doing to cope. Read More

The Grill: ADP's CIO on the granddaddy of SaaS
Even with continued success, ADP CIO Mike Capone keeps the pressure on to avoid complacency. Read More

Media sites brace for hactivist attacks
Traditional news companies and other websites covering this year's presidential election are preparing for a flood of Web traffic over the coming months, and not just from political junkies. Politically motivated hactivist attacks have become a top concern among companies providing election coverage online. Read More


WEBCAST: VCE/VMware

Demystifying Desktop Virtualization
Organizations faced with the growing costs and security concerns created by the quantity and diversity of personal computers and devices need a more secure, cost effective, flexible desktop environment. Now organizations can rapidly deploy a more secure, cost effective and flexible desktop environment. View Now

Facial recognition may need regulating
Congress may need to pass a law to limit the way government agencies and private companies use facial recognition technology to identify people, a U.S. senator said recently. Read More

NSA chief seeks help from hackers
Gen. Keith B. Alexander, National Security Agency director, addressed attendees of the recent Defcon hacker conference and asked for their help to secure cyberspace. Read More

9 popular IT security practices that just don't work
The security products and techniques you rely on most aren't keeping you as secure as you think Read More


WEBCAST: IBM

Changing the Competitive Dynamics of the Business
Date/Time: June 5, 2012, 11:00 a.m., EDT, 4:00 p.m. BST / 3:00 p.m. UTC Please join us for this webcast, as Dr. Barry Devlin, Founder and Principal, 9sight Consulting, describes what operational analytics can do for your business and reviews an architectural approach that will enable you to make it a reality. Register Now

The cloud services explosion
If you follow cloud computing, you're no doubt familiar with software-as a service, typically associated with Salesforce.com, or infrastructure as a service, which was pioneered by Amazon.com. But how about CaaS, SECaaS, DaaS, MaaS and BaaS? Read More

Cisco Ironport delivers strong email protection
The Cisco Ironport is an appliance that is deployed into an existing mail infrastructure. All emails are sent to the IronPort and the IronPort is either the last point out (most common configuration) or it can process email and then send it back to the mail server where it is sent out. Read More

Failure of Senate to pass Cybersecurity Act leaves us all at risk
The Senate failed to muster enough votes to pass the watered-down Cybersecurity Act of 2012 (S. 2105) earlier this month, which reminds me of the line by Col. Nathan R. Jessep in the movie "A Few Good Men": "All you did was weaken a country today ... That's all you did. You put people's lives in danger." Read More

A phishing tale about the one that got away
I knew immediately that the email appearing to be from US Airways was actually a phishing attempt because it asked me to confirm a flight I had not booked from a city near which I do not live. Read More



SLIDESHOWS

9 ex-Googlers on the move
Former Google employees continue to make their mark on the tech world.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. iPhone 5 to come with much smaller 8-pin dock connector
  2. WikiLeaks dumps Stratfor email dirt on TrapWire, a CIA-connected global spying system
  3. Cisco readying a new Nexus switch
  4. 10 trends driving big data in financial services
  5. RTM builds of Windows 8 reveal Microsoft blocked any bypassing of the Metro desktop
  6. Apple suppliers' banner July suggests iPhone 5, iPad mini launches imminent
  7. Top 5 cities for big data jobs
  8. Steam on Ubuntu could hurt gaming on Linux
  9. IBM claims spintronics memory breakthrough
  10. Open-source movements butt heads over logo

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: