Carnegie Mellon gets $6M for security software to protect vehicles from hackers | Google privacy chief blasts Microsoft's "Scroogled" campaign at RSA Conference | ||||||||||
Network World Security | ||||||||||
Top 10 security startups at RSA WHITE PAPER: AccelOps Operationalizing Information Security ebook The use of security information and event management (SIEM) as part of an integrated security management program is an information security best practice. Read Now In this Issue
WHITE PAPER: Dell SonicWall A New Set Of Network Security Challenges IT faces conflicting mandates from the business. On one hand, employees demand access from devices beyond the firewall such as smartphones, tablets, home PCs and laptops. On the other hand, risk management dictates corporate data must remain protected. The overarching challenge: balance productivity and security. A Must Read! Carnegie Mellon gets $6M for security software to protect vehicles from hackers Google privacy chief blasts Microsoft's "Scroogled" campaign at RSA Conference RSA: IT security managers skeptical on Big Data Security proposition WHITE PAPER: Moovweb 3 Steps to a Cost-Effective Mobile Strategy In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now! What is so infinitely cool about Mars? Sandia Lab lays claim to world's largest fiber optic local area network General Dynamics eyes government-level security on smartphones WHITE PAPER: HP Providing Security for Software Systems in the Cloud The software industry has learned that putting fancy boxes on the network doesn't fix bad software, cloud converts must focus on the risks they bring along with the software they deploy. This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk. Learn more. Azure outage births free cert monitoring software F5 tries to stay ahead of the curve with moves into security and beyond Applying big data approaches to information security a challenge Samsung's Knox should have Apple worried about the enterprise | ||||||||||
SLIDESHOWS 10 tech company social media bloopers Social media blunders are nothing new, and the technology industry is not immune to them. JOIN THE NETWORK WORLD COMMUNITIES As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). MOST-READ STORIES 1. Sergey Brin says using a smartphone is 'emasculating' 2. Microsoft's Secure Boot, Red Hat request ignites Linus Torvalds' NSFW flame war 3. iPad 5 rumor rollup for the period ending Feb. 27 9. The best office apps for your iPad, round 5 4. 25 most beastly robotic animals 5. 10 network virtualization, SDN and data center companies to watch 6. Juniper Networks tried to sell enterprise assets: report 7. Forrester: 70% of 'private clouds' aren't really clouds at all | ||||||||||
Do You Tweet? You are currently subscribed to networkworld_security_alert as security.world@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Network World, please send an e-mail to customer_service@nww.com. Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. ** |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Friday, March 01, 2013
Top 10 security startups at RSA
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment