Search This Blog

Friday, September 06, 2013

Best tools for protecting passwords

FireEye offering APT-detection service to notify customers of stealthy attacks | Researchers know how to crack Windows 8 picture passwords

Network World Compliance

Forward this to a Friend >>>


Best tools for protecting passwords
For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and personal Web-based services, as well as for employees who share a local server login. Read More


WHITE PAPER: Citrix

Securing Enterprise Info : Android, iOS & Windows Devices
Android, iOS and Windows tablets and smartphones play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with Citrix BYOD solutions View Now

WHITE PAPER: Eaton Corporation

The Essential Guide to Managing Power
Data center managers are harnessing the efficiency and cost savings of converged infrastructure: Centralized management of IT resources, consolidated systems, increased resource utilization rates and lower data center costs are part of the rationale to consider moving your organization to a convergent solution. Read the full cost-benefit analysis. Learn more

FireEye offering APT-detection service to notify customers of stealthy attacks
FireEye today announced it has started providing a threat-detection and notification service called Oculus intended to warn the enterprise security manager whenever targeted attacks seek to undermine the network for cyber-espionage purposes. Such attacks are often called "advanced persistent threats," and may be attempts by nation states or their agents to penetrate a company to steal sensitive information, such as intellectual property. Read More

Researchers know how to crack Windows 8 picture passwords
We all know text-based passwords are not overly secure, so when Microsoft offered a Picture Gesture Authentication (PGA) system on Windows 8, many people chose that option. However, if you chose a photo of a person to setup your picture password and used tap, tap, tap as your gestures on the picture—with at least one of those on the eyes—then you chose the most common gesture type and facial area... Read More

Drone hunters lining up and paying out in Colorado
What might have started out a whimsical protest against government surveillance tactics has morphed into a little more than that as a small town in Colorado has found itself overwhelmed with requests and cash for a unmanned aircraft hunting license that doesn't exist - yet. Read More

Products of the week 9.02.13
Our roundup of intriguing new products from companies such as Dell and CheckPoint Read More


WHITE PAPER: Meru Networks

Wireless Networking: The Promise of the 802.11ac Standard
This IDC Technology Spotlight explores the trends driving BYOD (bring your own device) adoption and the associated impact on enterprise-grade WLANs, especially as it relates to the emerging high capacity 802.11ac Wi-Fi standard. Learn more >>

Introducing the world's first 'anti-trolling software'
British company SMC4 has developed a new software product that could land a pretty high-profile user base - anti-trolling software. According to the Telegraph, SMC4 Lite "reads all inbound and outgoing social media messages from the user's Twitter account and automatically blocks any profanity, sexism, racism and other inappropriate language." Read More

Top tech hoarders: 15 companies with huge cash piles
Apple, Microsoft, Google and Cisco are flush with cash, and so are many other tech companies Read More

Samsung fortifies enterprise security on its Android phones
Maker of popular Galaxy smartphones teams up with Lookout Mobile Security to bolster its own Knox technology Read More

APT malware NetTraveler learning new tricks
Advanced Persistent Threat exploits Java vulnerabilities, embraces watering hole technique, says researcher Read More


WHITE PAPER: CDW

BI Checklist for IT Pros
Learn the key selection criteria required to provide your organization with the capability to address structured data, unstructured data and mobile demands so that employees can view and manipulate data on their own, from virtually any location. Read Now

Apple remote-mobile device management patent raises red flags
Despite legitimate uses, libertarians say tech-enforced policy is 'taking control out of the hands of the user and putting it in the third party's' Read More

BYOD security challenges are old mortarboard for universities
Businesses are only now discovering problems education has coped with for years Read More

INSIDER
Cloud Helps Financial Company Spin Up a New IT Operation
Another company acquired about 75 percent of Lincoln Trust, along with its technology, which left the CTO with a pressing need for a new technology platforma(c). Read More

NIST Cyber Security Framework proposal provides no 'measurable cybersecurity assurance'
Plan's self-regulatory approach toward industrial control systems 'doesn't do us a hell of a lot of good,' another expert said Read More


SLIDESHOWS

Top tech hoarders: 15 companies with huge cash piles

Apple, Microsoft, Google and Cisco are flush with cash, and so are many other tech companies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Court orders retrial in Google Maps-related murder case

2. First look: Samsung's new Galaxy gadgets

3. 10 hard-earned lessons of a lifetime in IT

4. Could this be Cisco's Internet of Everything core switch/router?

5. Cisco users on Notice

6. Amazon hiring 'top secret' IT staff as it fights for CIA work

7. iPad 5 rumor rollup for the week ending Sept. 3

8. Top tech hoarders: 15 companies with huge cash piles

9. Best tools for protecting passwords

10. IBM discovers its inner Kickstarter via enterprise crowdfunding


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: