Search This Blog

Thursday, June 27, 2013

Cisco Unveils a New Security Architecture at CiscoLive

  FTC commissioner calls for way to 'reclaim your name' | Who said that? Social network launched for anonymous users
 
  Network World Security

Forward this to a Friend >>>


Cisco Unveils a New Security Architecture at CiscoLive
As someone with more than 25 years in the IT industry, I have to give strong kudos to Cisco for putting on a great show this week. CiscoLive is being held in Orlando which is totally appropriate as Cisco has made the event the "magic kingdom" of all things IT. Surrounded by abundant symbols of the "Internet of Everything," Cisco really presents itself as the one vendor CIOs should look to... Read More


WHITE PAPER: Stonesoft Corporation

Stonesoft Firewall Appliances for Demanding Environments
To keep up with today's sophisticated threats and complex network traffic, a first generation firewall will not do. View now

WHITE PAPER: Dell Inc.

2013 Next Generation Firewall Security Value Map
Read this case study to learn how ZapFi enabled comprehensive gateway security and granular application intelligence for large-volumes of wireless and VPN traffic. In addition, ZapFi eliminated overhead and latency, by integrating Dell SonicWALL SuperMassive, TZ Series and Global Management System (GMS) solutions. View Now

FTC commissioner calls for way to 'reclaim your name'
U.S. consumers should be able to reclaim control of their personal data from data brokers, websites and other companies, a member of the U.S. Federal Trade Commission said Wednesday. Read More

Who said that? Social network launched for anonymous users
The Duvamis social network went online less than a month ago with a mission of keeping the identity of its posters from other users -- and site operators. Read More

Chinese malware attack affected dozens of South Korean organizations, researchers say
A recent targeted attack that used Chinese malware compromised over 1,000 computers belonging to dozens of South Korea organizations, according to researchers from Israeli security firm Seculert. Read More


WHITE PAPER: Cisco Systems

Getting the Most Out of Your Next-Generation Firewall
Trends such as BYOD and the adoption of social media and other grey applications as legitimate business tools have had profound effects on organizations of all sizes. Read Now

Most Android threats would be blocked if phones ran latest Android version, report says
Over three quarters of Android threats are malicious apps that send SMS messages to premium rate numbers and could be mitigated by a protection feature present in Android 4.2, according to researchers from networking vendor Juniper Networks. Read More

Cyberattacks the greatest threat to nations, say global execs
Business brass and IT pros around the world believe cyber attacks are a greater threat to their countries than a physical attack, a survey released Tuesday by Cyber Ark reveals. Read More

Suspected China-based hackers 'Comment Crew' rise again
The suspected China-based hackers known as the "Comment Crew" are back at it again, a development likely to contribute to continued tensions between the U.S. and China over cyberattacks. Read More


WHITE PAPER: IBM

A Smarter Approach to CRM: An IBM Perspective
Read this white paper, created in collaboration with Frost & Sullivan, to see how a customer relationship management (CRM) solution can help you respond on the customers' terms. Learn More.

Symantec software monitors sensitive Apple iOS iPhone, iPad e-mail
Symantec today said the updated version of its Data Loss Prevention (DLP) suite will be able to monitor confidential data sent by e-mail via Apple iPhones and iPads. Read More

How you invade your own privacy
A new study from consulting firm Infosys shows consumers globally are far more relaxed about sharing their private data than we knew and far more relaxed than they should be Read More

Protection is a pricey perk for top tech CEOs
Some tech boardrooms go to expensive lengths to protect the top brass. Company funds are authorized for cars, drivers, bodyguards, and residential security systems to keep CEOs safe. Read More

 

SLIDESHOWS

Ultimate ultrabook shootout

Testing of eight Windows 8 ultrabooks reveals that users looking for a sleek form factor will have to accept tradeoffs.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPad 5 rumor rollup for the week ending June 24

2. Best college tech majors for landing a top starting salary

3. Quick look: 10 cool analog computers

4. Cisco forms Internet of Things group

5. Dell pushes harder on encryption, anti-malware for client devices

6. Cisco delivers "monster" Catalyst switch in major product refresh

7. Scientist out to break Amdahl's law

8. 6 highest/lowest paid IT jobs

9. iFixit giving away 1,776 'iPhone Liberation Kits'

10. Hack and attacking automated homes

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: