Search This Blog

Monday, October 14, 2013

Google Tells Feds It Wants to Disclose Surveillance Orders

NSA surveillance revelations prompt EFF resignation from Global Network Initiative | New NIST cybersecurity standards could pose liability risks

Network World Security

Forward this to a Friend >>>


Google Tells Feds It Wants to Disclose Surveillance Orders
Google, Microsoft, Facebook, Yahoo and LinkedIn are ramping up efforts in Congress and the Foreign Intelligence Surveillance Act (FISA) court to win authority to publish figures about data-collection orders received from the feds. The counter argument is that such disclosure would undermine the efforts of the intelligence community. Read More


WHITE PAPER: Dell SecureNetworks

CISO's Guide to Advanced Attackers
No matter the size of your organization, advanced cyber-attacks represent a credible threat to your organization. Security analyst firm Securoris and Dell SecureWorks collaborated on this guide to help gather intelligence, mine for threat indicators, respond to alerts and break the attack process. Read now!

WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

NSA surveillance revelations prompt EFF resignation from Global Network Initiative
The reported participation of technology companies in the U.S. National Security Agency's surveillance programs has prompted digital rights watchdog the Electronic Frontier Foundation to resign from the Global Network Initiative, a multistakeholder group whose members include Google, Microsoft, Yahoo and Facebook and whose stated mission is to advance privacy and freedom of expression online. Read More

New NIST cybersecurity standards could pose liability risks
Critical infrastructure companies could face new liability risks if they fail to meet voluntary cybersecurity standards being developed by the National Institute of Standards and Technology. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Battelle deploys quantum key-protected network in full production
Science research organization Battelle has deployed what's believed to be the first quantum-key encrypted network for full production use in the United States by encrypting all traffic between its Columbus and Dublin, Ohio, area facilities using the photon-based technique. Read More

Mobile shopping remains stifled by security, ease of use
Without exception, using a credit or debit card was deemed more secure than a mobile phone, whether the purchase was made in-store or online, according to a survey sponsored by the National Cyber Security Alliance and PayPal. In addition, the personal computer was seen as the safest option for accessing the Web by 62 percent of the respondents versus six percent who chose a smartphone. Read More


WHITE PAPER: VMware

The Clear Path to Cloud Security, Compliance, & Cost Control
Both customers and IT decision makers are concerned about cloud security, according to recent research. How can you negotiate this barrier to realize the benefits of cloud computing? Read this paper to learn about the techniques, tools, and technologies that will enable you to capitalize on the cloud safely and cost-effectively. Read Now

Google to pay rewards for open-source code security fixes
Google said Wednesday it plans to reward developers for developing proactive security improvements for some of the most widely used open-source software programs. Read More

Inside CIO paychecks
Bonuses, stock awards and executive perks boost pay for CIOs and senior IT leaders Read More

6 cool new wireless technologies from MIT
MIT grad students show off their research at Wireless Retreat Read More

2013 tech industry graveyard
Google, Microsoft and Yahoo among those reading products their last rites Read More


SLIDESHOWS

The 'Bad Boys' of open source

The open source world's most notorious characters.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. In a room with no cell service, Verizon works on the future of mobile

2. Careers that are being automated into oblivion

3. Why I'm excited for Linux Mint 16, even though I don't like Mint

4. Gartner: The top 10 IT altering predictions for 2014

5. 10 ways IT pros can reduce stress at work

6. NSA backdoor fears creating crisis of confidence in U.S. high-tech products, services

7. Your car is about to go open source

8. Three lessons from Netflix on how to live in the cloud

9. Shh ... Cisco's latest switch supports VMware NSX

10. Inside CIO paychecks


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: