Search This Blog

Wednesday, June 12, 2013

Cisco looks to standardize context-aware security

  Retired admiral calls NSA leaks by Edward Snowden a 'data breach' and 'crisis' | Microsoft's BYOD game plan is surprisingly impartial
 
  Network World Security

Forward this to a Friend >>>


Cisco looks to standardize context-aware security
Cisco is looking to standardize a framework it developed for integrating disparate security products from multiple vendors. The framework is called the Platform Exchange Grid (pxGrid) and it allows third-party developers of security applications to develop capabilities for Cisco's Identity Services Engine (ISE). ISE is designed to provide policy-based, context-aware security for Cisco networks. Read... Read More


WHITE PAPER: Stonesoft Corporation

Stonesoft Firewall Appliances for Demanding Environments
To keep up with today's sophisticated threats and complex network traffic, a first generation firewall will not do. View now

RESOURCE COMPLIMENTS OF: LogMeIn

Powerful and secure remote support with LogMeIn Rescue
For companies that want to compete in their industry, improving the customer experience is a top priority. To do that, having an on-demand remote support solution is essential. That's why companies around the world choose LogMeIn Rescue to provide powerful, secure support of any device, anytime, anywhere. Rescue offers a simple, reliable interface packed with all the features technicians want. Check out LogMeIn Rescue to learn more and start your free trial today.

Retired admiral calls NSA leaks by Edward Snowden a 'data breach' and 'crisis'
Adm. Mike Mullen, U.S. Navy (retired), called the leaks coming from former CIA employee Edward Snowden about the National Security Agency's role in intelligence collection a "huge breach" that undermines the country's security. Read More

Microsoft's BYOD game plan is surprisingly impartial
Microsoft has wrapped up its annual TechEd North America conference in New Orleans, which means those unfortunate enough to have gone should be finished wringing the sweat out of their clothes by now. Among the many developments at the show was Microsoft's clear support for the whole bring your own device (BYOD) trend. I'm actually surprised, because BYOD was born out of a rebellion against Microsoft... Read More

Gallery: Telltale signs of ATM skimming
ATM skimming schemes involve installing fraudulent equipment that criminals use to steal credit and debit card numbers and PINs. Industry estimates calculate that ATM fraud costs banks and consumers billions of dollars annually. Here are a few things to look for the next time you need to hit the ATM. Read More


WHITE PAPER: Dell Inc.

2013 Next Generation Firewall Security Value Map
Read this case study to learn how ZapFi enabled comprehensive gateway security and granular application intelligence for large-volumes of wireless and VPN traffic. In addition, ZapFi eliminated overhead and latency, by integrating Dell SonicWALL SuperMassive, TZ Series and Global Management System (GMS) solutions. View Now

MIT researchers advance cloud security with end-to-end encyrption
University researchers have taken an important step forward on cloud security by proving it's possible for a server to process encrypted data and to send back a still-encrypted result. Read More

The art and science of risk management
Computers, networks, and information security seem to fall comfortably under the heading of science, but science alone is not enough. Security system developerA Tripwire recently conducted a survey in cooperation with the Ponemon Institute to find out whether IT professionals consider risk management to be "science" or "art." Read More

VMware: We're building one of the biggest SDN deployments in the industry
VMware hopes to make the networking components of its soon-to-be-released vCloud Hybrid Service one of its biggest selling points, and in doing so the company plans to build one the largest software-defined networking (SDN) deployments in the industry. Read More


WHITE PAPER: McAfee

Eight "Must-Have" Firewall Rules
With the torrent of new threats resulting from Web 2.0, it's likely that your existing firewall is leaving you exposed. This checklist should help you understand the advanced features available in next generation firewalls and guide your evaluation process. Read Now

Cities search for solution to phone-theft epidemic
Upgrade your firewalls, insist on 16-character passwords, and apply all your security patches the day they come out. None of that may matter: The sad reality is that the biggest computer crime your organization is likely to face is the physical theft of a mobile device, should one of your traveling sales staff find their car broken into and their laptop bag stolen or merely become the victim of a subway bump-and-grab. Read More

European Parliament delays vote on sharing passenger data with US authorities
European Union lawmakers have delayed a vote on what authorities can do with airline passengers' data following the revelations about the U.S. National Security Agency's Prism data collection system. Read More

Android Trojans spread by Bluetooth, hijack bank codes
A Trojan that spreads itself via Bluetooth and another that's received a mobile upgrade to steal SMS banking codes have been discovered by security researchers. Read More

 
 
 

SLIDESHOWS

8 struggling technologies: Which ones will survive?

The following technology platforms appear to be struggling – some may ultimately flop and some may end up surviving and thriving.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPhone 6 rumor rollup for the week ending June 7

7. The world is not flat: Apple unveils 'fresh, light' iOS 7

2. How to opt out of PRISM, the NSA's spying program

3. Gartner: 7 major trends forcing IT security pros to change

4. Kinder, gentler Torvalds: Don't make me curse at you again

8. Getting the most out of flash storage

5. Intel's new Haswell chips may be hot, but not in a good way

9. Cisco overtakes IBM as top cloud hardware provider, research firm says

6. Oops. Microsoft takes down some researchers' servers along with Citadel botnet sites

10. 10 scary facts about Bitcoin

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: