Search This Blog

Friday, March 15, 2013

Security pros pan and praise Microsoft's plans on updating Modern apps in Windows 8, RT

  Security Services Continue to Prosper -- Quietly | US intelligence agency wants to know how to use alternate reality gaming to bolster research
 
  Network World Security

Forward this to a Friend >>>


Security pros pan and praise Microsoft's plans on updating Modern apps in Windows 8, RT
Microsoft will issue security fixes for its Windows Store apps on the fly, not just on the familiar monthly Patch Tuesday, the company said this week. Read More


WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

WHITE PAPER: Meraki

802.11ac Migration Guide
With 802.11ac poised for widespread adoption in 2013, there are several steps that network administrators can take now to ensure a smooth transition. Our cloud-based management allows Meraki networks to take advantage of the next generation of WiFi without disrupting an existing deployment. Learn More!

Security Services Continue to Prosper -- Quietly
Like all other areas of IT, security professionals tend to be computer science nerds. We love to talk about hardware and software advancement and how it will impact the challenges around the security triad of confidentiality, integrity, and availability. As always, this geeky tendency was on display at the RSA security conference in late February as the industry buzzed about things like streaming... Read More

US intelligence agency wants to know how to use alternate reality gaming to bolster research
The researchers at the government's "high-risk, high-payoff research" group, Intelligence Advanced Research Projects Activity (IARPA) want to know how alternate reality environments such as games in particular can help it develop "high-quality behavioral and psychological research in near real-world cont Read More

Mobile enterprise management tools are targeted by spyphones, researchers warn
Enterprises that use mobile device management (MDM) systems to protect their corporate data on employees' mobile phones are not safe from attacks from spyphones, researchers warned at BlackHat Europe on Thursday. Read More


WHITE PAPER: AccelOps

Unified Infrastructure Management Examined
AccelOps' Unified Infrastructure Management Examined: How network and security administrators can monitor performance, availability and events with just one application. Managing a More Dynamic and Complex World. Read More>>

US NIST's vulnerability database hacked
A U.S. government computer vulnerability database and several other websites at the National Institute of Standards and Technology have been down for nearly a week after workers there found malware on two Web servers. Read More

EU privacy watchdogs tell app developers and app stores to take care of users' data
New recommendations from Europe;s top privacy watchdog could have big ramifications for Google Play, Apple and application developers. Read More

Researchers resurrect and improve CRIME attack against SSL
Two researchers from security firm Imperva have devised new techniques that could allow attackers to extract sensitive information from users' encrypted Web traffic. Read More


WHITE PAPER: F5

2012 Magic Quadrant for Application Delivery Controllers
The application delivery controller has evolved into a key component of the data center architecture, and enterprises should evaluate ADCs based on how they integrate with this architecture and support more advanced features, such as user and traffic control and monitoring. This report provides insights into vendors' strengths and weaknesses. Read More.

The 10 greatest betrayals in high tech
Tech-minded backstabbers abound. Don't get caught this Ides of March with your back turned to the wrong vendor, partner, or customer Read More

20 historic tech sounds you may have forgotten
Boy, does technology evolve fast. How many of these iconic sounds do you remember? Read More

Startup brings digital rights mgmt. to iPhone, iPad, Android and Windows Phone
Startup Watchful Software says it's reviving the technology known as digital rights management (DRM) by expanding it beyond traditional platforms like Microsoft Windows PCs and bringing it to mobile devices such as iPhone, iPad, Android and Windows Phone. Read More

New Google site aimed at helping webmasters of hacked sites
Google has launched a site for webmasters whose sites have been hacked, something that the company says happens thousands of times every day. Read More

 
 
 

SLIDESHOWS

How different tech degrees measure up

Here's our list of lucrative tech degrees, ranked from lowest to highest starting salary.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 awesome ways to celebrate Pi Day 2013

2. Lawyer registered PopeFrancis.com … 3 years ago

3. iPad 5 rumor rollup for the week ending March 13

9. Google Reader axed along with several other services

5. Cheeky browser plug-in paddles 'cloud' peddlers

6. Users flock to Japan student's firewall-busting thesis project

7. Turing Award goes to MIT crypto experts Goldwasser and Micali

8. Windows 8: How to solve the Start Button dilemma

10. NASA's inspector general paints bleak picture for agency projects, IT security

4. Security of open-source software again being scrutinized

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: