Search This Blog

Wednesday, September 11, 2013

Cisco takes aim at security services with new division

Google plan to thwart government surveillance with encryption raises stakes | Nope, mesh networks won't stop the NSA

Network World Security

Forward this to a Friend >>>


Cisco takes aim at security services with new division
Cisco today said it would add a security arm to its existing services division with an eye toward pushing its support of its security products as well as offering a range of managed security services. Read More


RESOURCE COMPLIMENTS OF: Check Point Software Technologies

What's Hiding in Your Network?
Based on research of nearly 900 companies, the Check Point 2013 Internet Security Report uncovers major security risks organizations are exposed to on a daily basis. Discover how often Bots endanger your enterprise. See how commonly-used Web applications can be high risk. And learn how easy it is to experience unintentional data loss. Read the Full Report

WHITE PAPER: HP and Intel®

Bursting with HP CloudSystem
Read this white paper sponsored by HP and Intel® to learn how bursting can bring your business users and IT back into strategic alignment, as you jointly exploit new business opportunities enabled by private, public, and hybrid clouds. Learn More

Google plan to thwart government surveillance with encryption raises stakes
Strategy would make probing data flow expensive and hard, likely forcing the NSA to obtain a court order for targeted data Read More

Nope, mesh networks won't stop the NSA
Read More

National Archives wants your online vote for iconic American rights exhibit
It's not too often the public gets to pick what the central component of a major museum exhibit but that's what the National Archives has in mind. Read More


WHITE PAPER: IBM

A Smarter Approach to CRM: An IBM Perspective
Read this white paper, created in collaboration with Frost & Sullivan, to see how a customer relationship management (CRM) solution can help you respond on the customers' terms. Learn More.

Email spam campaign distributes Android scareware
Android malware is following in the footsteps of Windows malware with attackers adopting some of the same distribution and monetization techniques despite the major differences between the platforms. Read More

"Oddball" asteroid – the third largest near-Earth rock -- is really a comet
An international team of scientist s today said a the third largest near-Earth object-believed for 30 years to be an asteroid, is actually a comet. Read More

Start-up offers IT security rating system
It's not uncommon for companies to want to try and evaluate the IT security of another business before entering into an e-commerce arrangement. Now a start-up, BitSight Technologies, is out with what it calls a "rating" service to do exactly this, though there are limits to how far it can go at this point. Read More


WEBCAST: IBM

IBM Intelligent Investigation Manager: Online Product Demo
Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more efficient and effective investigations. Learn More.

National Cyber Security Hall of Fame inducting five
The National Cyber Security Hall of Fame has announced five security pioneers will be inducted next month for their work on such fronts as intrusion detection and trusted computing. Read More

VCs throwing gobs of money at cloud, security, mobile startups
Tech startups focused in hot areas such as virtualization, mobility and security have pulled in tens of millions of dollars over the past week or so from venture capitalists looking to back the next big thing. Read More

Anomaly Detection Lets You Find Patterns in Log Data
Generating insight from log data traditionally requires writing a search. But that means you need to know which questions to ask. How do you get insight from data you know nothing about? Sumo Logic's answer combines machine learning and pattern recognition to detect anomalous events in your data. Read More

15 geeky places to visit before you die
If you like reliving geeky history, you'll want to add visiting to these places to your bucket list Read More


SLIDESHOWS

10 Sorriest Technology Companies of 2013

Microsoft, Apple and Samsung among those issuing mea culpas.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Clips from 6 previous iPhone debuts

2. All eyes on the iPhone 5C today

3. Ubuntu impresses Linux enterprise server test

4. Fatal distraction: 7 IT mistakes that will get you fired

5. Mockumentary skewers ISPs as Verizon FCC net neutrality case goes to court

6. The final iPhone 6 rumor rollup: what is Apple likely to do?

7. Cisco catching a falling Big Switch?

8. Security experts question if Google's Chrome Apps is worth the risk

9. Microsoft sticks to guns, will unveil refreshed Surface on Sept. 23

10. 15 geeky places to visit before you die


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: