Search This Blog

Monday, March 11, 2013

Hot security skills of 2013

  Killer open source admin tools | Wicked cool 3D printer creations
 
  Network World Security

Forward this to a Friend >>>


Hot security skills of 2013
Most successful CSOs will tell you it was a unique mix of skills that propelled them to their current position. Technical background is important, certainly, but practice in the business and excellence in communication are paramount for any CSO truly worthy of a place in the C-suite. We don't expect that to change any time soon. Read More


WHITE PAPER: RSA, The Security Division of EMC

Authentication and Identity Management
Analyst firm, CEB TowerGroup, recently conducted an independent analysis of the leading authentication solutions providers to help decision makers identify key components of a technology investment decision and effectively compare vendor technology products. Download their latest report to learn more. Learn more.

WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

Killer open source admin tools
13 tools for system and network admins looking for an edge Read More

Wicked cool 3D printer creations
3D printing can invite rapid development of technical and not to technical inventions Read More

Robots get an open source Web-based helpline
Scientists in Europe say they have developed a cloud service that lets intelligent robots dial in to get help with circumstances they may have not encountered before or a problem they cannot solve. Developed by the European RoboEarth project, the Rapyuta database is a repository of information, stored in a standardized language that robots can access for information as well as offload complicated computations... Read More


WHITE PAPER: F5

Vital Security Strategies for Microsoft Exchange
The demand for access to email anytime, anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn about vital security requirements every Exchange environment should have in place to improve security and availability for Exchange. Read Now.

With SecuSmart chip, German officials free to talk and type securely on BlackBerry Z10
German government officials including Chancellor Angela Merkel could soon be communicating about classified matters using BlackBerry Z10 smartphones equipped with a new micro-SD card from SecuSmart. Read More

Researchers rake in $280K at Pwn2Own hacking contest
Research teams Wednesday cracked Microsoft's Internet Explorer 10 (IE10), Google's Chrome and Mozilla's Firefox at the Pwn2Own hacking contest, pulling in more than $250,000 in prizes. Read More

Uniscon document exchange service uses two-factor authentication, stores no passwords
Uniscon's IDgard, a service for securely exchanging documents between companies and their clients or partners, uses two-factor authentication and stores only its customers' encrypted data on the server, with no passwords or hashes for hackers to steal. Read More


WHITE PAPER: Kaspersky Lab, Inc.

The CISO's Guide To Virtualization Security
This guide describes the security challenges within virtualized environments and shows how to apply the concepts of Forrester's Zero Trust Model of information security to secure the virtual environment effectively. Learn more.

Java and Flash vulnerabilities mean Macs are no longer safe from security threats
Recently Apple has taken to blocking Java and Flash via Xprotect, this is not surprising given the alarming number of vulnerabilities discovered so far this year Read More

Scroogled dents Google's reputation, claims Microsoft
Microsoft's anti-Google "Scroogled" campaign is a battle for hearts and minds as much as for search and email market share, and Microsoft claims the effort is making a difference. Read More

FBI data requests to Google outlined in report
Some thousand-plus Google users have been subject to FBI security information requests since 2009, the company said Tuesday. The data build on Google's already existing tally of government data requests. Read More

 
 
 

SLIDESHOWS

How different tech degrees measure up

Here's our list of lucrative tech degrees, ranked from lowest to highest starting salary.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Researchers discover cold temps can unlock secured Android phones

2. FTC dumps on scammers who blasted millions of text messages

3. Microsoft Patch Tuesday targets Internet Explorer drive-by attacks

9. 6 of the very coolest new Microsoft lab projects

5. Bizarre 5-pound Android tablet morphs into Win8 all-in-one

6. iPad 5 rumor rollup for the week ending March 6

7. Killer open source admin tools

8. CEO of Cisco competitor talking FUD

10. The best (and worst) countries for cloud computing

4. Mellanox looks to head off Cisco, Juniper with open source Ethernet plan

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: