Search This Blog

Monday, May 06, 2013

BlackBerry 10 cleared for use on US Department of Defense networks

H-1B reform debate pits tech firms against veteran IT workers | Wicked cool things to do in Las Vegas – after the tradeshow

Network World Security

Forward this to a Friend >>>


BlackBerry 10 cleared for use on US Department of Defense networks
The U.S. Department of Defense has cleared BlackBerry 10 smartphones and PlayBook tablets for use on its networks, amid reports that the department may also clear devices from Samsung Electronics and Apple. Read More


WHITE PAPER: Aerohive

Wireless LAN: Preferred Enabler of BYOD
Bring Your Own Device (BYOD) and its array of wireless devices is becoming the dominant way workers access corporate networks . And it's forced IT leaders need to reexamine how to best provide secure, reliable and cost-effective wireless network access. Read Now

WHITE PAPER: Tripwire

SANS Secure Configuration Management Demystified
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall security posture. Learn More

H-1B reform debate pits tech firms against veteran IT workers
Many U.S. tech companies are pushing hard this year for an increase in the number of high-skill immigrants allowed into the country, but many veteran IT workers question their motives for wanting to increase the number of visas under the controversial H-1B program. Read More

Wicked cool things to do in Las Vegas – after the tradeshow
Vegas is Sin City, which means there's plenty to do there other than just attend Interop, tech shows Read More

Systems manager arrested for hacking former employer's network
A 41-year-old man was arrested for allegedly disrupting his former employer's network after he was passed over for promotions, leading him to quit his job and take revenge, the U.S. Federal Bureau of Investigation said. Read More


WHITE PAPER: AccelOps

Operationalizing Information Security ebook
The use of security information and event management (SIEM) as part of an integrated security management program is an information security best practice. Read Now

Experts hope for another failure in next Anonymous attack
Anonymous' failed attack against Israeli websites last month has left security experts cautiously optimistic that the hacktivist group will be unsuccessful in its plans to disrupt U.S. government and banking sites. Read More

Websites compromised as Apple ID phishing emails attempt to steal credit card details
According to Trend Micro, there has been a recent spike in phishing sites targeting Apple IDs. Read More

NASA smartphone satellites beam clear images of Earth
The trio of Android smartphones NASA blasted into orbit recently have ended their journey by burning up in the atmosphere, but not before snapping shots of Earth -- and the pictures don't look too bad. Read More


WHITE PAPER: Riverbed Technology

Case Study: Boston College
Read this case study to learn how Boston College has reduced complexity of the backup process for over 1,700 seats by centralizing management. Read now

Remembering the little desk lamp that could: Pixar's "Luxo, Jr. "
People can toss around the phrase "game-changer" with perhaps a little to much ease these days but the two-minute short animated film "Luxo Jr'" released in 1986 by Pixar could be argued invented the term - at least in the world of computer animation. If you have never seen it, the movie revolves around two desk lamps: one large and one small. The larger lamp watches while the smaller, "younger"... Read More

Security Threat Landscape - May 2013
In this monthly video series focusing on the latest digital security threats, Keith Shaw and Fortinet's Derek Manky discuss the recent Twitter hack on the Associated Press, the Spamhaus arrests and DNS amplification, and the latest Android hacks. Read More

Facebook rethinks its 'hackathons' with an eye toward mobile
Facebook is retooling its famous "hackathon" all-night coding workshops to give engineers more time to conceive new products, hopefully with a focus on mobile. Read More

Security Threat Landscape - May 2013
In this monthly video series focusing on the latest digital security threats, Keith Shaw and Fortinet's Derek Manky discuss the recent Twitter hack on the Associated Press, the Spamhaus arrests and DNS amplification, and the latest Android hacks. Read More

2013 National Inventors Hall of Fame Inductees: From DSL to Dummies
Creators of digital subscriber line technology, CDMA and the crash-test dummy among those honored Read More



SLIDESHOWS

CEO pay

Median pay for tech CEOs in 2012 was $10.7 million, according to Network World's analysis of CEO compensation in the tech industry.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Skype accounts easily hijacked via Skype Support, warns hacker

2. Windows 8 update: 2nd generation Surface tablets may debut next month

3. 20 geeky gifts for Mother's Day

10. Companies explore self-detonating data as security control

9. Systems manager arrested for hacking former employer's network

6. iPad 5 rumor rollup for the week ending May 1

5. 10 awesome ways to celebrate International Star Wars Day

4. Facebook 'Trusted Contacts' lets you pester friends to recover account access

7. Hope you like Jelly Bean, because you're not getting Key Lime Pie

8. Arista heading off Cisco/Insieme at 100G SDNs?


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: