Search This Blog

Wednesday, September 18, 2013

HP rolls out next-gen firewall line, threat-detection service

Computer science major ranks No. 8 for salary potential | DARPA hunts airplane-like spacecraft that can go Mach 10

Network World Security

Forward this to a Friend >>>


HP rolls out next-gen firewall line, threat-detection service
HP today took the wraps off its Next-Generation Firewall line designed to exert application-level controls and visibility over all traffic related to the enterprise, including mobile devices used in public WiFi settings and traffic from cloud services. Read More


RESOURCE COMPLIMENTS OF: Canon

Unified Mobile Document Management Solutions from Canon
Mobile printing solutions with the Canon imageRUNNER ADVANCE Series and smart uniFLOW software can create huge cost efficiencies across organizations. It's a scalable and simple system that supports secure mobile printing, print from anywhere capabilities, flexible authentication and integrated tracking and reporting. Experience SIMPLY ADVANCED.

RESOURCE COMPLIMENTS OF: SolarWinds

Free Whitepaper from SolarWinds: NetFlow Tips & Tricks
Network bandwidth usage is one of the biggest contributors to your network performance. By taking advantage of the flow technology that is built into most routers and switches, you can quickly identify bottlenecks and troubleshoot bandwidth related problems. Take your NetFlow skills to the next level! Read this FREE whitepaper for an introduction to NetFlow & other flow technologies, as well as configuring your network to collect flow data.

Computer science major ranks No. 8 for salary potential
PayScale ranked 129 college majors based on earning potential. Engineering, math, science and technology fields dominated the rankings. Read More

DARPA hunts airplane-like spacecraft that can go Mach 10
The idea is cool enough - build a reusable aircraft-like system that could easily and relatively cheaply launch satellites into orbit. The kinks will be that the system need do that for somewhere in the $5 million per launch range and oh yeah, go well over Mach 10. As you might have guessed, the project to develop such a system is being put forth by Defense Advanced Research Projects Agency (DARPA) which will more fully detail the program, known as the Experimental Spaceplane (XS-1) in October. Read More

NIST doles out $7M in grants to ensure consumers' online privacy and security
The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) has announced more than $7 million in security- and privacy-related grants. Read More


WHITE PAPER: Dell SecureNetworks

CISO's Guide to Advanced Attackers
No matter the size of your organization, advanced cyber-attacks represent a credible threat to your organization. Security analyst firm Securoris and Dell SecureWorks collaborated on this guide to help gather intelligence, mine for threat indicators, respond to alerts and break the attack process. Read now!

Four ways to defend against DDoS attacks
Given that Distributed Denial of Service (DDoS) attacks are becoming more frequent, it is a good time to review the basics and how you can fight back. Read More

MIT team says space weather has taken out satellites
Bad space weather -- everything form solar flares, geomagnetic storms and electromagnetic radiation has wreaked havoc on a number of satellites over the years and much more needs to be done to protect these systems that provide so much of our communications systems. Read More

What the NSA and business (should) have in common
Regardless of where you sit on the privacy vs. security spectrum regarding the controversy over the NSA collecting telephony metadata for millions of phone calls, the situation has made one thing clear: telephony metadata can be valuable. In fact, now is a good time to evaluate (or create) a system for internally gathering and making the most out of this important, but often overlooked information source. Read More


WHITE PAPER: Novell

Mobile Zen: Balancing End-User Productivity and IT Control
Mobility is often seen as a zero-sum game: either end users or IT can win, but never both. Learn how users can have the convenience and mobile productivity they need, while IT retains control over enterprise goods. Victory for both sides. Learn More

Zettaset working toward Big Data encryption for Hadoop
Zettaset, which makes management and security software for Hadoop, says it plans to add encryption capabilities by year end. Read More

Security researchers create undetectable hardware trojans
Security researchers from the U.S. and Europe released a paper showing how integrated circuits used in computers, military equipment and other critical systems can be maliciously compromised during the manufacturing process through virtually undetectable changes at the transistor level. Read More

IBM follows Cisco in partnering with Continental to build networked car technology
IBM this week signed up with Continental - Europe's second largest car parts company - to jointly develop automated automobile technology. Read More

Air Force whacks 52-year old space fence
The so-called "space fence," a VHS-based system of radars and transmitters that has watched space for incoming objects since 1961 will cease to exist as of Oct. 1. Some reports say the system has already shut down. Read More


SLIDESHOWS

The Android naming quiz

The upcoming version of Android is called KitKat, but how well do you know the earlier release names?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 15 of the richest techies

2. 5 bad signs for Apple's iPhone 5S fingerprint scanner

3. 20 essential business apps for iPhone and iPad

4. Super-fast Wifi: Cisco, Ubiquiti access points top out at nearly 400Mbps

5. Juniper ships SDN controller, dismisses OpenDaylight technology

6. Juniper's Contrail makes 'frenemies' with VMware

7. HTC grants our wishes: HTC One will run Windows Phone 8

8. Patch expert wants Ballmer to get to the bottom of buggy Windows, Office updates

9. 10 best alternatives to the iPhone 5S

10. Cisco can't shield customers from patent suits, court affirms


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: