Search This Blog

Friday, February 22, 2013

How Colorado's CISO is revamping the state's information security -- on a $6,000 budget

Dell: We can beat Cisco in enterprise and cloud security | All-seeing Big Bro Domain Awareness System coming to all 34,000 NYPD cops

Network World Security

Forward this to a Friend >>>


How Colorado's CISO is revamping the state's information security -- on a $6,000 budget
Before Jonathan Trull took over as Chief Information Security Office for the state of Colorado in 2012, he had already been working in the Colorado Office of the State Auditor for a decade. As the Deputy State Auditor, he was responsible for overseeing annual audits of the state's systems. Read More


WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

WHITE PAPER: HP

Providing Security for Software Systems in the Cloud
The software industry has learned that putting fancy boxes on the network doesn't fix bad software, cloud converts must focus on the risks they bring along with the software they deploy. This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk. Learn more.

Dell: We can beat Cisco in enterprise and cloud security
Dell can trump Cisco in the information-technology security market, say Dell's executives in describing how the company with its multifaceted approach will hold an edge against some powerful rivals that also include HP and IBM. Read More

All-seeing Big Bro Domain Awareness System coming to all 34,000 NYPD cops
Do you recall the all-seeing Big Brother and terrorism prevention system that Microsoft and the New York Police Department launched in August 2012, otherwise called the Domain Awareness System? Read More


WHITE PAPER: F5 Networks

Solving Substantiation with SAML
Read this paper to learn how F5 uses SAML to effectively enable secure web domains to exchange user authentication and authorization data, providing users of web browsers with single sign-on (SSO) convenience they need. Learn More!

EDUCAUSE/Internet2 call on college students to create security awareness videos, posters
Why do I have the feeling there might be more than one Harlem Shake-related video in this contest? EDUCAUSE and the Internet2 Higher Education Information Security Council (HEISC) are holding a contest in search of two-minutes-or-less information security awareness videos and posters developed by college students for college students. Read More

Mandiant gains instant fame after Chinese hack report
Mandiant's release on Tuesday of a mother lode of information on Chinese hacking efforts could turn out to be a financial mother lode for the company itself. Read More


WHITE PAPER: McAfee

Next Generation Network IPS
This paper discusses the six critical management capabilities of next-generation IPS solutions to help reduce operational overhead while unifying across multiple environments, streamlining security operations and protecting against targeted threats. Read Now

Security firms slow to react to spear phishing like that used in China hack
Email security vendors have failed to do enough to protect customers against advanced cyberattacks like the one recently linked to the Chinese military, experts say. Read More

13 IT security myths debunked
They're security myths, oft-repeated and generally accepted notions about IT security that...simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them (if you'd prefer to zip through a slideshow version of this, click here) Read More



SLIDESHOWS

13 of the biggest security myths busted

13 myths about information-technology security you'll hear but should you believe?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Notification of .edu server breach mistaken for phishing email

2. First look: Firefox 19

3. Dell: We can beat Cisco in enterprise and cloud security

4. The beginning of the end of BYOD as we know it

5. Petition to legalize cell-phone unlocking tops 100,000 signatures

6. Microsoft Azure overtakes Amazon's cloud in performance test

7. Cisco declares war on Microsoft unified communications system

8. The Samsung Galaxy S 4 shows up in New Zealand, and on an AT&T stat sheet

9. iPhone 6 rumor rollup for the week ending Feb. 15

10. U.S. students get cracking on Chinese malware code


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: