Search This Blog

Friday, March 01, 2013

Top 10 security startups at RSA

  Carnegie Mellon gets $6M for security software to protect vehicles from hackers | Google privacy chief blasts Microsoft's "Scroogled" campaign at RSA Conference
 
  Network World Security

Forward this to a Friend >>>


Top 10 security startups at RSA
Read More


WHITE PAPER: AccelOps

Operationalizing Information Security ebook
The use of security information and event management (SIEM) as part of an integrated security management program is an information security best practice. Read Now

WHITE PAPER: Dell SonicWall

A New Set Of Network Security Challenges
IT faces conflicting mandates from the business. On one hand, employees demand access from devices beyond the firewall such as smartphones, tablets, home PCs and laptops. On the other hand, risk management dictates corporate data must remain protected. The overarching challenge: balance productivity and security. A Must Read!

Carnegie Mellon gets $6M for security software to protect vehicles from hackers
Keeping hacker cyber-nastiness away from manned or unmanned ground vehicles is the idea behind a 4.5-year, $6 million grant from the Defense Advanced Research Projects Agency (DARPA) to Carnegie Mellon University. The project is part of DARPA's High-Assurance Cyber Military System (HACMS) program launched last year to produce ultra secure software systems to protect important networked assetsfrom hacks,... Read More

Google privacy chief blasts Microsoft's "Scroogled" campaign at RSA Conference
You know people are sensitive about their online privacy when Microsoft seeks advantage over Google by running TV ads that claim anyone using services like gmail gets "scroogled" because Google sells keyword and behavior data to marketers. Read More

RSA: IT security managers skeptical on Big Data Security proposition
While "Big Data Security" is now the industry buzzword and defines a way to get enterprise customers into a new method of threat detection based on mining massive amounts of security-event and business data to pinpoint threats, the response from a few IT shops seems to be"thanks, but no thanks." Read More


WHITE PAPER: Moovweb

3 Steps to a Cost-Effective Mobile Strategy
In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now!

What is so infinitely cool about Mars?
Interest in exploring the Red Planet is at an all-time high -- from millionaire private space-goers to world-wide space programs and scientists Read More

Sandia Lab lays claim to world's largest fiber optic local area network
Sandia National Laboratories said today it has completed over 90% of what it calls the largest fiber optical local area network in the world. Read More

General Dynamics eyes government-level security on smartphones
General Dynamics is looking to bring U.S. government-level security to consumer smartphones, allowing organizations to benefit from the type of strong data protection only available on expensive and clunky mobile terminals. Read More


WHITE PAPER: HP

Providing Security for Software Systems in the Cloud
The software industry has learned that putting fancy boxes on the network doesn't fix bad software, cloud converts must focus on the risks they bring along with the software they deploy. This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk. Learn more.

Azure outage births free cert monitoring software
A certificate snafu grounded Microsoft's Azure cloud last weekend for more than a day, prompting one company to create a free service to help certificate administrators avoid similar mistakes. Read More

F5 tries to stay ahead of the curve with moves into security and beyond
F5 Networks is best known for its high-end network management hardware, especially its BIG-IP line of load balancers. Those offerings have fueled annual revenue growth from $525 million to more than $1.3 billion since 2007, even in the face of the recent recession. Read More

Applying big data approaches to information security a challenge
Applying big data approaches to information security can help enterprises build better situational awareness capabilities, but implementation could prove to be a major challenge, security experts said at the RSA Conference 2013 being held here this week. Read More

Samsung's Knox should have Apple worried about the enterprise
Samsung's Knox, the secure enterprise enhancements to its Android devices, is not unique, but it is brilliant nevertheless. Market dominance, control over mobile hardware, and Android's open source model made this a straightforward development for Samsung that should pay dividends. It could even create a contagion of secure Android products from other Android device manufacturers. Read More

 
 
 

SLIDESHOWS

10 tech company social media bloopers

Social media blunders are nothing new, and the technology industry is not immune to them.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Sergey Brin says using a smartphone is 'emasculating'

2. Microsoft's Secure Boot, Red Hat request ignites Linus Torvalds' NSFW flame war

3. iPad 5 rumor rollup for the period ending Feb. 27

9. The best office apps for your iPad, round 5

4. 25 most beastly robotic animals

5. 10 network virtualization, SDN and data center companies to watch

6. Juniper Networks tried to sell enterprise assets: report

7. Forrester: 70% of 'private clouds' aren't really clouds at all

8. 9 Linux podcasts you should follow

10. Marissa Mayer: CEO of the year 1955

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: