Thursday, August 29, 2013

VMware spotlights key NSX security tool for deploying security software and services

Outgoing DHS chief Napolitano to successor: "You will need a large bottle of Advil" | School starts mass social media surveillance of students for their 'safety'

Network World Security

Forward this to a Friend >>>


VMware spotlights key NSX security tool for deploying security software and services
VMware's NSX network virtualization platform, expected out by year end, will have a key security tool for deploying security software and services to VMware-based virtual machines. Read More


RESOURCE COMPLIMENTS OF: Network World Tech Tours

SDN and Network Virtualization event in Philly and Wash. DC
Attend and learn how SDN works, its potential in the enterprise, and why leading, bellwether organizations are leveraging it for data center and large-scale networking efficiency- Learn more and register in a city most convenient for you. 9/17- Philly; 10/8- Wash. DC Click to continue

WHITE PAPER: Webroot Software

Managing Web Security in a Challenging Threat Landscape
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. Learn More

Outgoing DHS chief Napolitano to successor: "You will need a large bottle of Advil"
The outgoing Secretary of Homeland Security Janet Napolitano told a gathering at the at the National Press Club this week that the United States will among other security challenges - "face a major cyber event that will have a serious effect on our lives, our economy, and the everyday functioning of our society." Nice words her potential replacement, who hasn't been named yet, will love to hear no... Read More

School starts mass social media surveillance of students for their 'safety'
A California school district, citing it's for the children's "safety" excuses, hired a company to monitor students' social media posts even when the kids are not on campus. Glendale Unified School District includes "31 schools and over 2,620 employees, serving 27,000 students in grades Kindergarten through 12th grade." The district is paying $40,500 for Geo Listening to analyze the social media posts... Read More


WHITE PAPER: Citrix

10 Reasons to Strengthen Info Security with Virtualization
New ways of working call for new ways of managing risk. Mobility, flexwork, BYOD and increased collaboration across organizations have changed the risk profile and undermine existing IT architectures. This paper describes how desktop virtualization can help regain control and reduce risk without sacrificing business productivity and growth. Learn More

Spear phishing led to DNS attack against the New York Times, others
The cyberattack that resulted in nytimes.com and some other high-profile websites being inaccessible to a large number of users Tuesday started with a targeted phishing attack against a reseller for Melbourne IT, an Australian domain registrar and IT services company. Read More

Outgoing DHS chief Napolitano to successor: "You will need a large bottle of Advil"
The outgoing Secretary of Homeland Security Janet Napolitano told a gathering at the at the National Press Club this week that the United States will among other security challenges - "face a major cyber event that will have a serious effect on our lives, our economy, and the everyday functioning of our society." Nice words her potential replacement, who hasn't been named yet, will love to hear no... Read More


WHITE PAPER: IBM

Security First Insurance
Using IBM Content Analytics and ECM software, the insurer enhances service to policyholders no matter which channels they use to get in touch. Learn More.

Half of organizations targets of cyberattack in last year
More 'shocking' is that 10% of organizations polled did not know if they'd been targeted or not Read More

DNS hack in Australia hits marquee US sites
Twitter, The New York Times and other prominent websites were struck by a powerful cyberattack that continued affecting other websites into Tuesday evening, directing visitors to a site purportedly controlled by the Syrian Electronic Army (SEA). Read More

Tesla's Model S vulnerable to hackers, kind of
It's the curse of the connected car – once it's linked to the Internet, it's, well, on the Internet. In the case of the Tesla Model S, this means that malicious hackers could, in theory, control some functions of the vehicle and even track it without the owner's knowledge. Read More

Social engineering: Study finds Americans willingly open malicious emails
In a study conducted by TNS Global for Halon, an email security service, 30 percent of those surveyed admitted they would open an email, even if they were aware that it contained a virus or was otherwise suspicious. To be fair, the study only included 1,000 adults within the U.S., so this isn't a national index by any means. Read More


SLIDESHOWS

Hot products from VMworld 2013

Click through to see all the latest from the show in San Francisco.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Old electronics don't die, they pile up

2. Microsoft will craft XP patches after April '14, but not for you

3. Linus Torvalds celebrates 22 years of Linux with nostalgic message

4. Cisco in for a virtual fight

5. Microsoft Windows 8 is not Ballmer's biggest regret

6. 9/11 hero & Akamai co-founder Danny Lewin recalled in new book

7. Hot products from VMworld 2013

8. 12 seriously cool "toys" for big boys and girls

9. Is the rumored 64-bit Apple chip for iPhone 5S just wishful thinking?

10. Top 10 Amazon cloud challengers


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment