Search This Blog

Thursday, February 28, 2013

Microsoft's Secure Boot & Red Hat request ignites Linus Torvalds' NSFW flame war

  Do enterprise security teams want "Big Data Security"? | Juniper's "device fingerprinting" security technology gets mixed reviews
 
  Network World Security

Forward this to a Friend >>>


Microsoft's Secure Boot & Red Hat request ignites Linus Torvalds' NSFW flame war
We all may have bad days from time to time, but if it progresses to language that would be bleeped out on mainstream TV news, then a person might hope that it doesn't receive undue attention. Read More


WHITE PAPER: Symantec

Endpoint Protection Performance Benchmark Testing Report
Learn how top endpoint solutions compare in the Small Business Endpoint Protection Performance Benchmark Testing Report. Read Now!

WHITE PAPER: Dell SonicWall

Smart Security for Escalating Challenges
This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls. Read now.

Do enterprise security teams want "Big Data Security"?
A big theme at the RSA Conference this year is a concept known as Big Data Security -- the idea that massive amounts of data related to both network security and of business context should be stockpiled to be analyzed to pinpoint malware, rogue insiders and stealthy attacks aimed at stealing sensitive data. Read More

Juniper's "device fingerprinting" security technology gets mixed reviews
Detection and blocking of security threats against organizations often is done through IP address-based methods and reputation services, but Juniper this week launched an effort to encourage security managers to abandon IP-based detection in favor of the "device fingerprinting" its security gear now supports to pinpoint devices used in online attacks. The idea is getting mixed reviews so far. Read More


WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

New security tool serves Amazon Cloud users
For many IT managers, moving your company's backbone to the cloud brings a certain sense of freedom. However, the task of caring for and protecting your assets remains. After all, the operative word in "virtual server" is "server"; virtual or not, it's still a fully functioning server from an operational sense, carrying the same risks and vulnerabilities inherent in physical servers. You'll need vulnerability management tools to ensure those servers are secure. Read More

Apple, BlackBerry, others sued over security patents
Security company Maz Encryption Technologies sued seven large technology companies for allegedly infringing on several of its security patents. The suits target security technology used in the iPhone and iPad as well as the BlackBerry Enterprise Solution, among other products. Read More


WHITE PAPER: F5 Networks

The New Application Delivery Firewall Paradigm
Learn how you can effectively combat these modern attacks with a new firewall paradigm that protects the datacenters and ensures reliability. Learn More!

25 Most Beastly Robotic Animals
What a zoo! These mechanical creatures run, crawl, swim and fly not much unlike the real things Read More

Cyberattacks, data breaches scare off investors, study says
Data breaches and cyberattacks aren't just a worry for consumers who've had personal information filched; They can also scare away investors. Read More

Cloud security forecast: Murky with an 80% chance of finger pointing
Despite the best efforts of cloud service providers and industry groups like the Cloud Security Alliance, cloud security remains a troublesome issue for IT execs. Read More

Stuxnet was attacking Iran's nuke program a year earlier than thought
The Stuxnet worm was at work sabotaging a uranium plant in Iran a year earlier than previously thought and before a U.S. covert program to disrupt the facility was officially authorized by former President George W. Bush, according to a report on a previously unknown version of the worm. Read More

 
 
 

SLIDESHOWS

10 tech company social media bloopers

Social media blunders are nothing new, and the technology industry is not immune to them.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Juniper Networks tried to sell enterprise assets: report

2. 10 network virtualization, SDN and data center companies to watch

3. 10 LinkedIn tips to boost your networking success

4. Forrester: 70% of 'private clouds' aren't really clouds at all

5. Android phone blasts into space aboard satellite

6. West Virginia auditor blasts Cisco, state for 'oversized' router buy

7. iPhone 6 rumor rollup for the week ending Feb. 22

8. Hottest products at RSA Conference 2013

9. 14 dirty IT tricks, security pros edition

10. Hottest products at Mobile World Congress 2013

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: