Search This Blog

Thursday, June 13, 2013

Gartner reveals Top 10 IT Security Myths

  Gartner: 7 major trends forcing IT security pros to change | Every Network Failure Should Be Used to Improve the Network
 
  Network World Security

Forward this to a Friend >>>


Gartner reveals Top 10 IT Security Myths
When it comes to information security, there are a lot of "misperceptions" and "exaggerations" about both the threats facing businesses and the technologies that might be used to protect their important data assets, according to Gartner analyst Jay Heiser. Read More


WHITE PAPER: McAfee

Eight "Must-Have" Firewall Rules
With the torrent of new threats resulting from Web 2.0, it's likely that your existing firewall is leaving you exposed. This checklist should help you understand the advanced features available in next generation firewalls and guide your evaluation process. Read Now

WHITE PAPER: Cisco Systems

Getting the Most Out of Your Next-Generation Firewall
Trends such as BYOD and the adoption of social media and other grey applications as legitimate business tools have had profound effects on organizations of all sizes. Read Now

Gartner: 7 major trends forcing IT security pros to change
Enterprises are under heavy pressure to change their approach to IT security because of a "nexus of forces" that include big data, social networking, mobile and cloud computing, according to Gartner. Read More

Every Network Failure Should Be Used to Improve the Network
Let's accept reality. A network is so much more than just the sum of its electronic parts, operating systems, and configurations. It is an extension of the past and the present of our company. Much like the growth rings of a tree, we can look at our company's network and see all the human history of our company. Read More

Vooza's 'Weak Password' video: We've all been there
Not sure which part of this Vooza video I enjoyed more. This line: "Churchill? Really? I just robbed your bank account." Or when the woman fashioning the password runs her fingers all over the keyboard in a classic display of aggressive passive aggression. Watch: It's funny because it's so true. Read More


WEBCAST: Cisco, Dell/Sonic Wall, HP, McAfee, Sophos, Stonesoft

Black Market IT
Patrick Sweeney from Dell/SonicWALL, Alan Toews of Sophos and Robin discuss the threat posed by employees use consumer services such as Gmail and drop boxes to get around IT controls. View Now

Study finds voice-controlled interfaces distract drivers
When talking or texting, drivers take longer to hit the brakes -- even if they're not hitting tiny keyboards, researchers at the University of Utah have found. Read More

Gartner: Start security monitoring in the public cloud
Security monitoring — the type involving traditional security information and event management (SIEM) — can be done in some public cloud environments, according to Gartner. And if you're using public cloud services, it's time to think about doing it. Read More

Carnegie Mellon video net brings Harry Potter Marauder's Map to life
A network of video cameras melded a unique algorithm let scientists with the Carnegie Mellon University track the locations of multiple individuals in complex, indoor setting - just like Harry Potter's Marauder's Map. Read More


WHITE PAPER: Tripwire

10 Steps to Risk-based Security Management
Many professionals in information security espouse the belief—and commitment to—"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Learn More

Bitcoin isn't PRISM-proof
In the aftermath of the revelation of PRISM, the NSA spying program that collects user data from nine major U.S. tech companies, many have highlighted alternate options from organizations that are not known to be cooperating with government surveillance efforts. Read More

Facebook, Twitter support Google's call for transparency in surveillance requests
Facebook, Twitter and Microsoft have joined Google in asking for greater transparency in surveillance requests, following widespread criticism of the U.S. government's surveillance programs and the role of the Internet companies. Read More

Prism leaker steps forward, cites 'massive surveillance machine'
The person responsible for disclosing details on the growth of U.S. government surveillance programs that exploded into public view last week has identified himself as 29-year-old Edward Snowden, a technology contractor working at the U.S. National Security Agency. Read More

 
 
 

SLIDESHOWS

8 struggling technologies: Which ones will survive?

The following technology platforms appear to be struggling – some may ultimately flop and some may end up surviving and thriving.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Ubuntu Touch: First look at the Linux smartphone OS

7. Gartner reveals top 10 IT security myths

2. VMware: We're building one of the biggest SDN deployments in the industry

3. Network World First Look: Apple's iOS 7

4. Cisco overtakes IBM as top cloud hardware provider, research firm says

8. iPhone 6 rumor rollup for the week ending June 7

5. Getting the most out of flash storage

9. Cisco looks to standardize context-aware security

6. How to opt out of PRISM, the NSA's spying program

10. Gartner: 7 major trends forcing IT security pros to change

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: