Search This Blog

Tuesday, September 03, 2013

Best tools for protecting passwords

BYOD security challenges are old mortarboard for universities | 10 hard-earned lessons of a lifetime in IT

Network World Security

Forward this to a Friend >>>


Best tools for protecting passwords
For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and personal Web-based services, as well as for employees who share a local server login. Read More


RESOURCE COMPLIMENTS OF: Network World Tech Tours

SDN and Network Virtualization event in Philly and Wash. DC
Attend and learn how SDN works, its potential in the enterprise, and why leading, bellwether organizations are leveraging it for data center and large-scale networking efficiency- Learn more and register in a city most convenient for you. 9/17- Philly; 10/8- Wash. DC Click to continue

WHITE PAPER: Webroot Software

Phishing 2.0: Why phishing is back as the No. 1 web threat
This whitepaper discusses a major new threat vector - "phishing 2.0." While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. Learn More

BYOD security challenges are old mortarboard for universities
Businesses are only now discovering problems education has coped with for years Read More

10 hard-earned lessons of a lifetime in IT
Hotshot young techies take heed: Here are 10 things I wish I knew before starting my career in IT Read More


WEBCAST: Dell VMware

A Smarter Approach to Data Protection
This KnowledgeVault focuses on some of the key data protection challenges that today's enterprises must tackle. Specifically, the three videos in this series will explore the dramatic impact that unprecedented data growth and other developments have had on the data center View Now

Leaked US spying budget reveals investments in 'groundbreaking' cryptanalysis
The U.S. intelligence community is reportedly using a fifth of its US$52.6 billion annual budget to fund cryptography-related programs and operations. Read More

Offshoring Will Kill 1.5 Million IT Jobs by 2017
Approximately 1.5 million IT jobs will be eliminated by offshoring and productivity improvements, according to the Hackett Group. And those jobs are not coming back. Read More


WHITE PAPER: Verizon

Top Benefits of M2M Data Analytics
A recent Computerworld survey reveals that the combination of machine-to-machine (M2M) communications and the cloud will meet growing storage requirements, improve customer service and ensure better governance. Learn More

Indian bureaucrats may be asked not to use private email services for official work
The Indian government is expected to require that Indian bureaucrats use email service provided by the National Informatics Center for their official work, as it tries to secure its communications infrastructure. Read More

Microsoft: Talks with US gov't on surveillance transparency break down
Negotiations have broken down between two Internet giants and U.S. government representatives over the companies' requests to publish information on the surveillance requests they receive, a Microsoft executive said Friday. Read More

Facebook legal skirmish highlights user privacy risks
Can people or businesses expect Facebook, or any other for-profit social network, to place their privacy above revenue? The answer is no Read More

What is a vulnerability?
Judging by initial appearances, our security testing turned up a ton of vulnerabilities – nearly 150 of them. In reality, however, none represented actual issues in the Huawei switch. Read More


SLIDESHOWS

Hot products from VMworld 2013

Click through to see all the latest from the show in San Francisco.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPad 5 rumor rollup for the week ending August 28

2. 10 sorriest technology companies of 2013

3. Cisco responds to VMware's NSX launch, allegiances

4. VMware CTO on network virtualization, security and competition with Cisco

5. Cisco cracks down on security vulnerability

6. Apple's iPhone trade-in program is a game changer

7. Why Microsoft's next CEO will fail

8. Old electronics don't die, they pile up

9. Juniper kills MobileNext mobile packet product line

10. Exclusive test: Huawei switch: Good first effort


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: