Search This Blog

Tuesday, February 19, 2013

13 of the biggest security myths busted

  New report says cyberspying group linked to China's army | Consumers support a cybersecurity policy, survey says
 
  Network World Security

Forward this to a Friend >>>


13 of the biggest security myths busted
13 myths about information-technology security you'll hear but should you believe? Read More


WHITE PAPER: F5 Networks

Solving Substantiation with SAML
Read this paper to learn how F5 uses SAML to effectively enable secure web domains to exchange user authentication and authorization data, providing users of web browsers with single sign-on (SSO) convenience they need. Learn More!

WHITE PAPER: Fiberlink Communications

Achieving True Enterprise Mobility
Download MDM Is Only Half the Battle from CITO Research to learn the tenets of effective Mobile Device Management (MDM) and the need for the same conversations to take place around Mobile Application Management. Learn More

New report says cyberspying group linked to China's army
A new report traces a large cybersecurity threat group to China's People's Liberation Army, specifically an unit that goes under the cover name "Unit 61398". Read More


WHITE PAPER: McAfee

Next Generation Network IPS
This paper discusses the six critical management capabilities of next-generation IPS solutions to help reduce operational overhead while unifying across multiple environments, streamlining security operations and protecting against targeted threats. Read Now

Consumers support a cybersecurity policy, survey says
When I wrote last week that we need a national cybersecurity policy I took a lot of heat on the social media networks from my fellow security industry professionals. Some told me the best thing the government could do was stay out of cybersecurity. Read More


WHITE PAPER: Symantec

Is Online Backup Right For Your Business?
Read this whitepaper to find out how cloud-based hybrid backup offers significant cost savings, to small and medium-size businesses, as well as flexible options designed for agility, and a workforce that is free to focus on the company's core offering. Read Now!

Certificate authorities band together to boost security
At a time when certificate authorities are under attack by cybercriminals, a group of companies has formed an alliance to try to improve the security of the CA infrastructure. Read More

Flip side to Burger King Twitter hack: Many new followers
Burger King saw a surprising upside after its Twitter account was compromised on Monday: tens of thousands of people began following its account. Read More

Google Play shares too much personal info, app developer says
Google is in the information business. But one app developer is accusing it of providing him with "TMI" -- too much information -- about his customers. And this sharing of user information from Google Play has reignited an online debate over privacy protection and notification online. Read More

 
 
 

SLIDESHOWS

12 hybrid cloud security products to watch

Here are 12 security products that you can buy for your hybrid cloud whether they run on premise, in the cloud or a little of both.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Galaxy S IV design reportedly finalized, along with pint-sized variant

2. 15 products we love (or the geekiest Valentines ever)

3. Three safer, speedier Adobe Reader alternatives

4. The pleasure of finding things out about Richard Feynman

5. Microsoft patches IE with record-setting updates to prep browser for Pwn20wn

6. Internet Explorer only? IE doubt it

7. Apple working on fix for iOS 6.1 bug that's choking Exchange servers

8. Career advice that will change your life

9. 10 biggest time killers at work

10. Android phones are connecting without carrier networks

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: