Search This Blog

Friday, June 07, 2013

The top technologies the CIA thinks are hot

  Fave Raves: 25 IT pros name their favorite products | CITE 2013: Gary Hamel on Hacking Management
 
  Network World Security

Forward this to a Friend >>>


The top technologies the CIA thinks are hot
A quick look at what technologies the Central Intelligence Agency's investment arm – known as In-Q-Tel—is investing in Read More


WEBCAST: NetIQ

The Future of Identity in a world of Cloud and Mobility
Cloud, Mobility, Social Identity and BYOD are forcing small businesses, major enterprises and government agencies to re-think their interaction with customers and partners. Learn More>>

RESOURCE COMPLIMENTS OF: LogMeIn

Powerful and secure remote support with LogMeIn Rescue
For companies that want to compete in their industry, improving the customer experience is a top priority. To do that, having an on-demand remote support solution is essential. That's why companies around the world choose LogMeIn Rescue to provide powerful, secure support of any device, anytime, anywhere. Rescue offers a simple, reliable interface packed with all the features technicians want. Check out LogMeIn Rescue to learn more and start your free trial today.

Fave Raves: 25 IT pros name their favorite products
Each year we ask IT pros what they love -- which enterprise tech products make their lives easier, provide the security they need, and help keep end users happy and productive. See what 25 IT pros had to say. Read More

CITE 2013: Gary Hamel on Hacking Management
Noted business leadership author Gary Hamel chats with Matt Rosoff from CITEworld about his CITE 2013 keynote, which discussed how companies can get away from bureaucracy and give more power to employees to innovate. Read More

ISC patches publicly disclosed denial-of-service vulnerability affecting BIND 9
The Internet Systems Consortium (ISC), the organization that develops and maintains the widely used BIND DNS (Domain Name System) software, has patched a publicly disclosed vulnerability that can be used to remotely crash DNS servers running recent releases of BIND 9. Read More


WHITE PAPER: Stonesoft Corporation

Stonesoft Firewall Appliances for Demanding Environments
To keep up with today's sophisticated threats and complex network traffic, a first generation firewall will not do. View now

Android antivirus products a big flop, researchers say
Android smartphones and tablets are under attack, and the most popular tools developed to protect them are easily circumvented, according to new research from Northwestern University and the University of North Carolina. Read More

Seculert uses big data security analytics to precisely identify APTs and other malware
Despite huge expenditures on enterprise security infrastructure, including firewalls, IPS and other devices, Gartner claims 95% of enterprises are already compromised with advanced persistent threats or other malware. Security startup Seculert offers a new cloud service that identifies malware on your network. Read More

8 Web Apps That Will Change Your Business
Is your business struggling to collaborate, communicate or connect with customers? These apps may be just the ticket to meet those challenges. Read More


WHITE PAPER: Cisco Systems

Getting the Most Out of Your Next-Generation Firewall
Trends such as BYOD and the adoption of social media and other grey applications as legitimate business tools have had profound effects on organizations of all sizes. Read Now

Report: Secret court order gives US access to Verizon call records
The U.S. National Security Agency has been allowed by a court order to collect phone records of a large number of customers of Verizon, according to a report in the Guardian on Thursday. Read More

Bitcoin payments could be a landmine for companies
Businesses that accept Bitcoins as payment risk making the transactions publicly traceable, which could get companies in trouble with government regulators, experts say. Read More

Online ring for trading in stolen credit card data busted
Law enforcement agencies in the U.S., Vietnam and the U.K. have disbanded a ring that allegedly sold online credit card details since 2007. Read More

INSIDER
Hot cloud products IT pros swear by
Spending on cloud services is so far just a fraction of total IT spending -- roughly 3% -- but the market is growing. IT pros explain what they like about their favorite cloud-based security, storage and management services. Read More

Design Automation Conference at 50: Bring on the women, cloud and maybe even open source
The Design Automation Conference (DAC) held here this week celebrated its 50th anniversary, prompting the industry and academic community that poured so much energy into chip, software and hardware design to both take a look back and to predict what the future may hold. Read More

 
 
 

SLIDESHOWS

12 must-play Android games

Our top picks for gaming on your Android device.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. The top technologies the CIA thinks are hot

2. IT departments won't exist in five years

3. CCIE's raise Voice over Cisco cert move

4. Microsoft to include Outlook app with update to Windows 8 RT

10. Analyst says iPhone 4's U.S. sales injunction could cost Apple billions

8. Cisco betters its best-selling Catalyst Ethernet switch

5. Your Wi-Fi speed stinks. Here are 10 things you can do about it

9. Big Switch lowers forecast for OpenDaylight SDN effort

6. Stack wars: OpenStack vs. CloudStack vs. Eucalyptus

7. Microsoft: Hybrid cloud is good for IT, end users and corporate bottom line

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: