Search This Blog

Friday, June 14, 2013

Microsoft protects cloud with directory-integrated two-factor authentication

Microsoft criticized for botnet takedown tactics | To friend or not to friend: What if William Shakespeare had been a power Facebook user?

Network World Security

Forward this to a Friend >>>


Microsoft protects cloud with directory-integrated two-factor authentication
Microsoft is upping the security on Azure with Active Authentication, a new service now in preview which allows enterprises to secure access to hosted applications such as Office 365 with two-factor authentication. Read More


WHITE PAPER: Dell Inc.

2013 Next Generation Firewall Security Value Map
Read this case study to learn how ZapFi enabled comprehensive gateway security and granular application intelligence for large-volumes of wireless and VPN traffic. In addition, ZapFi eliminated overhead and latency, by integrating Dell SonicWALL SuperMassive, TZ Series and Global Management System (GMS) solutions. View Now

WHITE PAPER: Cisco Systems

Getting the Most Out of Your Next-Generation Firewall
Trends such as BYOD and the adoption of social media and other grey applications as legitimate business tools have had profound effects on organizations of all sizes. Read Now

Microsoft criticized for botnet takedown tactics
Security pros are said to be against any vendor modifying a person's computer without permission, even if the intention is good Read More

To friend or not to friend: What if William Shakespeare had been a power Facebook user?
Carnegie Mellon researchers call the project Six Degrees of Francis Bacon (SDFB). But what it is is an great big data mining project that tries to trace the influence and ideas of Bacon, William Shakespeare, Isaac Newton and more than 6,000 others from the 16th-17th centuries to let scholars and students reassemble and discuss or debate the era's networked culture. Read More


WHITE PAPER: HP

6 Steps to Application Performance Optimization
Poor application performance can cost more than you think. In fact, Enterprise Management Associates reports that it can exceed $1 million per hour in large enterprises. Read Now!

Interview: Lauren Cooney on Cisco's take on SDN
Network World Editor-in-Chief John Dix chats with Cisco's Lauren Cooney about the company's take on software-defined networking (SDN), and why companies shouldn't just rip out their existing infrastructure to implement it. Read More

Even before NSA scandal, US residents were anxious about privacy breaches
Even before bombshell disclosures of the U.S. government's massive collection of Internet and cellphone data, many U.S. residents were very concerned about privacy violations. Read More


WHITE PAPER: IBM

Next-Generation Customer Experience Management
This Aberdeen Analyst Insight provides an overview of the top factors driving 2013 customer experience management (CEM / CXM) programs. Learn More.

How Facebook Hashtags Impact Your Privacy
Following in the footsteps of Twitter, Pinterest, Instagram, Tumblr and other social networks, Facebook finally gets hashtags. Here's what you need to know about the new feature and a look at how it does--and doesn't--impact your privacy settings. Read More

US charges eight with multimillion-dollar cybercrime
U.S. federal prosecutors charged eight people on Wednesday in connection with a multimillion-dollar fraud that siphoned money from hacked accounts at banks and financial institutions, laundered it and sent it overseas. Read More

Obama's Cybersecurity Mandate Hits First Milestone
Government officials stress collaborative, voluntary approach as first wave of deliverables under the White House's executive order on cybersecurity comes due.. Read More



SLIDESHOWS

8 struggling technologies: Which ones will survive?

The following technology platforms appear to be struggling – some may ultimately flop and some may end up surviving and thriving.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 'Crazy ants' that destroy computers are immune to insecticide

7. New Cisco core router boasts 10X capacity of original

2. 14 manliest high-tech Father's Day gifts

3. Bitcoin isn't PRISM-proof

4. Susan Kare thinks Apple's new iOS icons are a step in the right direction

8. Gartner reveals top 10 IT security myths

5. Ubuntu Touch: First look at the Linux smartphone OS

9. Getting the most out of flash storage

6. Funny fixes! 8 low-tech solutions for high-tech problems

10. Juniper keeps its simplification promise


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: