Thursday, January 10, 2013

12 must-watch security startups for 2013

  Mobile attacks top the list of 2013 security threats | Many global organizations flub electronic-records requests
 
  Network World Security

Forward this to a Friend >>>


12 must-watch security startups for 2013
Despite security concerns, businesses are growing more confident in adopting cloud-based services, and in addition are investing more in corporate mobile devices while also allowing employees to use their own in bring-your-own-device mode at work. So it's not surprising that recent security startups are zeroing in on things such as encrypting data held in the cloud or how to safeguard corporate data on BYOD devices. Read More


RESOURCE COMPLIMENTS OF: Palo Alto Networks

Learn to Securely Enable Apps in Virtualized Data Centers
Evolve your network security architecture to address today's virtualized data center challenges, and the new app and threat landscape. Get your 'Network Security in Virtualized Data Centers for Dummies' ebook and learn how to adapt your security architecture to address new challenges, and today's application and threat landscape.

WEBCAST: PhoneFactor

Strong Security for Remote Workers Is Just a Phone Call Away
Join Steve Dispensa, PhoneFactor Chief Technology Officer, and Sarah Fender, PhoneFactor Vice President of Marketing & Product Management, to learn how phone-based authentication is helping companies tackle complex authentication challenges. Learn More

Mobile attacks top the list of 2013 security threats
For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon? Read More

Many global organizations flub electronic-records requests
More companies are tackling how to best set up their electronic records to be able to respond to any legal requests related to "electronic discovery" to quickly find internal documents for court purposes, but this "e-discovery" process is still a struggle, a survey published today indicates. Read More


WEBCAST: CDW Corporation

Unified Threat Management: A Better Approach to Security
In this Webcast you will learn how Unified Threat Management (UTM) combines firewall, IPS, Web filtering, antivirus and more in a single box to combat a broad range of threats efficiently and economically. Learn More.

Segregated healthcare networks rarely work, expert says
There are ways for healthcare organizations to protect the electronic health records (EHR) of their patients. But a segregated network for EHR is generally not one of them, says Martin Fisher, director of information security for Atlanta-based Wellstar Health System. Read More

When to call for help after a data breach
In spite of best practices, it is likely your organization will experience a serious data breach at some point. Once the initial shock wears off you'll be faced with numerous decisions, the most significant of which is whether to seek help from outside professionals such as attorneys, computer forensics investigators, information security consultants, privacy consultants and law enforcement. Read More


WHITE PAPER: Netscout Systems Inc.

Service-Oriented Performance Management Strategy
This white paper is to help IT organizations adopt a management methodology that enables them to improve the user experience by focusing on service delivery management. Learn More.

Cybercrime attacks on business bank accounts are dropping
Attacks by cybercriminals to steal funds electronically from commercial bank accounts appear to be less successful of late than in previous years, according to a survey of 100 large and small financial institutions. Read More

While the cyber war tail wags the national security dog, software security offers a different path to cyber peace
This is the fourth in my series of interviews with C-level executives who also happen to be thought leaders in cyber security and privacy. Remember? I enjoy pointing out that "C-level executive" and "thought leader" are not synonyms. Previously, I interviewed: Read More

 
 
 

SLIDESHOWS

Best of CES 2013: In pictures
Here's what's grabbing our attention right now at the sprawling CES 2013 gadget show in Las Vegas.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 'Worst CEO' list calls out Zynga's Pincus, Zuckerberg's 'hoodie mentality'
  2. Cool iOS accessories for iPhone and iPad unveiled at CES 2013
  3. Amazon's cloud hiccups, again
  4. Extreme Networks cutting 13% of workforce
  5. Five smartphone trends from Las Vegas
  6. Best of CES 2013: in pictures
  7. 12 must-watch security startups for 2013
  8. 10 wireless charging technologies on display at CES 2013
  9. Voice 'fingerprints' may plug call-center security leaks
  10. 8 classic IT hiring mistakes and how to avoid them
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment