Search This Blog

Friday, June 21, 2013

French privacy authority gives Google 3 months to change its ways

Take a data-centric approach to securing information in the cloud to protect against the risks of privileged users | Why is API security always somebody else's problem?

Network World Security

Forward this to a Friend >>>


French privacy authority gives Google 3 months to change its ways
France's data protection authority has given Google three months to change the way it handles users' private data, or face legal sanctions. Read More


WHITE PAPER: Aruba Networks

802.11ac Network-Readiness Checklist
Products based on the upcoming 802.11ac standard are going to dominate the enterprise WLAN landscape so, what should organizations do today to prepare? This technical checklist offers a framework for evaluating the features and benefits of 802.11ac for establishing a roll out plan. Read Now

RESOURCE COMPLIMENTS OF: LogMeIn

Powerful and secure remote support with LogMeIn Rescue
For companies that want to compete in their industry, improving the customer experience is a top priority. To do that, having an on-demand remote support solution is essential. That's why companies around the world choose LogMeIn Rescue to provide powerful, secure support of any device, anytime, anywhere. Rescue offers a simple, reliable interface packed with all the features technicians want. Check out LogMeIn Rescue to learn more and start your free trial today.

Take a data-centric approach to securing information in the cloud to protect against the risks of privileged users
Privileged users such as system, network and domain administrators can pose a significant threat to mission-critical systems or ones holding highly sensitive data. In fact, the consequences of a disruption in service or stolen confidential information can be severe enough ruin a business. Revocation of certifications, loss of critical intellectual property, and exposure to the consequences of a data breach disclosure are all part of the consequences. Read More

Why is API security always somebody else's problem?
OWASP recently updated its list of top 10 security vulnerabilities and, judging by the accompanying assessment, security continues to be a major issue with today's applications. This is especially true now in the era of APIs, where companies are making their core assets and business processes available for others to integrate in the hope of becoming a crucial (and thus "monetizable") part of an ecosystem.... Read More


WHITE PAPER: FICO (formerly Fair Isaac)

Deliver Customer Value with Big Data Analytics
Big Data requires that companies adopt a different method in understanding today's consumer. Read this white paper to learn why Big Data is not just another passing trend. Learn more.

Copper thefts measured in miles around Seattle
A couple of interesting developments in the Seattle are this week must have been keeping law enforcement busy. First, a number of outlets are reporting that prosecutors have charged two men with what is being called the largest metal theft in state history - 4.3 miles of copper wire from the underside of an elevated train line over an eight month period spanning 1010-2011. Read More

Microsoft launches security bounty programs for Windows 8.1 and IE 11 Preview
Microsoft will pay security researchers for finding and reporting vulnerabilities in the preview version of its Internet Explorer 11 (IE 11) browser, for finding novel techniques to bypass exploit mitigations present in Windows 8.1 or later versions and for coming up with new ideas to defend against exploits. Read More


WHITE PAPER: Stonesoft Corporation

Stonesoft Firewall Appliances for Demanding Environments
To keep up with today's sophisticated threats and complex network traffic, a first generation firewall will not do. View now

Many companies are negligent about SAP security, researchers say
SAP has significantly improved the security of its products over the past few years but many of its customers are negligent with their deployments, which exposes them to potential attacks that could cripple their businesses, according to security researchers. Read More

Best security tools for under $3,000
Check Point wins test of eight unified threat management (UTM) devices for small business Read More

Quick look: The NSA security quagmire
Big mess: FBI now looking at Edward Snowden's disclosures about the National Security Agency's broad monitoring of phone call and Internet data from big companies such as Google and Facebook. Read More


SLIDESHOWS

Best security tools for under $3,000

Check Point wins test of eight unified threat management (UTM) devices for small business.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Keep the AGs away from Google's autocomplete

7. Start-up readies network-optimized Linux for data centers

2. iPad 5 rumor rollup for the week ending June 18

3. Cisco denies spying

10. Apple end-to-end encryption far from bulletproof

4. Scientist out to break Amdahl's law

8. Verizon accused of intentionally slowing Netflix video streaming

5. Latest iPhone 6 concept design inspired by Apple iOS 7 debut

9. FBI/IC3 says online mug shot 'extortion' a growing problem

6. Getting the most out of flash storage


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: