Search This Blog

Tuesday, April 23, 2013

Top SSL VPN tools

Cisco edges F5 in VPN shootout | The Internet of Things: Coming to a network near you

Network World Security

Forward this to a Friend >>>


Top SSL VPN tools
Cisco edges F5 in review of SSL VPN remote access appliances Read More


WEBCAST: Trusteer

Security Requirements vs. Operational Challenges
In this webinar, guest speaker Rick Holland, senior analyst serving Security & Risk Professionals at Forrester Research, Inc., will discuss the security and operational challenges associated with advanced malware protection. Learn More.

WHITE PAPER: PhoneFactor

Guide to Evaluating Multi-Factor Authentication Solutions
Whether you're planning to implement two-factor authentication for the first time or are looking to expand or upgrade your current implementation, this whitepaper will help you choose the two-factor solution that is right for your business. Learn More

INSIDER
Cisco edges F5 in VPN shootout
Connecting remotely to network servers is a fact of life for millions of end users. Whether working from a PC or a mobile device, users rely on secure, reliable remote connections to maintain their productivity. Read More

The Internet of Things: Coming to a network near you
When people talk about the Internet of Things (IoT), the most common examples are smart cars, IP-addressable washing machines and Internet-connected nanny cams. Read More

25 weirdest things in the 'Internet of Things'
Read More

Security Manager's Journal: A little housecleaning
Our manager finds the time and opportunity to cross a few nagging items off of his to-do list. Read More


WHITE PAPER: Tripwire

10 Steps to Risk-based Security Management
Many professionals in information security espouse the belief—and commitment to—"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Learn More

Post Boston: Privacy advocates warn about coming tsunami of surveillance cameras
In The Dangers of Surveillance, Neil Richards, law professor at Washington University in St. Louis, made a case for legally recognizing why surveillance is harmful. Read More

Interop planning guide 2013
It's that time of the year again: Interop is almost here. Read More

'Aurora' Cyber Attackers Were Really Running Counter-Intelligence
An attack Google attributed to Chinese targeting human-rights activists was actually a case of hackers probing U.S. surveillance on undercover agents, according to the senior director of Microsoft's Institute for Advanced Technology Read More

Viewpoint: When it comes to enterprise security, is it better to focus on compliance or risk?
A CIO once quipped, "Security isn't hard, compliance is." And in fact many companies focus their security efforts on meeting compliance requirements. But if you are audit compliant, have you in fact addressed all of your risks, or are you just kidding yourself? Is it better to focus on the risks presuming that doing so will cover you off on the compliance side? Network World Editor in Chief put the question to two practitioners, both of whom come down on the side of risk. Read More


WHITE PAPER: McAfee

The Case For a New Data-Centric DLP
This ESG report focuses on how data-centric DLP provides an opportunity to lower risk and enable business agility. Read Now

Anonymous calls for Internet blackout to protest CISPA
Hacking group Anonymous asked websites to black out their front pages on Monday, in protest against legislation in the U.S. that would allow online companies and government agencies to more easily share personal information. Read More

Our Internet privacy is at risk -- but not dead (yet)
Legislation, stealth technologies, and emerging data privacy markets are proving that the battle for our Internet privacy has only just begun Read More

Java security questions answered
Most of the products tested (except Windows Server 2012), use Oracle's Java in one form or another, at least for client access and also in some cases within the management interface. With numerous vulnerabilities recently discovered in Java, leading to guidance from Department of Homeland Security and others to disable it entirely, this raised some questions about usability and possibly even security of the devices tested. Read More

Why security is in denial about awareness
Denial has two meanings. It can refer to the refuting of an allegation or assertion. It can also refer to a psychological defense mechanism where criticisms are rejected because they are uncomfortable, despite evidence to the contrary. How a professional group responds to criticism tells you a lot about their ability to evolve and improve. Read More

Some Windows XP users just can't afford to upgrade
I've already written about what I consider the folly of Microsoft's 15% off discount for XP holdouts, but this past week it was driven home to me just how bad the problem is, at least in some quarters. On Friday, I headed to the nearby Costco for an eyeglasses check. After all, you can't beat a $49 eye exam and it's as good as anything else I've had for much higher cost. Looking at the doctor's computer,... Read More



SLIDESHOWS

How to solve Windows 8 crashes

Like any computer operating system, Windows 8 can fall over. Luckily, there is an easy way to diagnose the cause of most crashes.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. The Internet of Things: Coming to a network near you

2. Ahead of their time: 9 technologies that came too soon

3. iPhone 6 rumor rollup for the week ending April 19

10. Cisco edges F5 in VPN shootout

9. Microsoft may backtrack on Start button in Windows 8

6. Popular home routers contain critical security vulnerabilities

5. Browsers pose the greatest threat to enterprise, Microsoft reports

4. IBM defends OpenDaylight from doubters

7. 10 nifty Windows 8 apps

8. Assange to Google's Schmidt: 'I don't use email'


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: