Search This Blog

Wednesday, November 13, 2013

12 hot security start-ups to watch

Should the NSA be reformed? Fierce debate rages | DOJ says Lavabit cannot prevent search warrants by 'locking its front gate'

Network World Security

Forward this to a Friend >>>


12 hot security start-ups to watch
Going into 2014, a whirlwind of security start-ups are looking to have an impact on the enterprise world. Most of these new ventures are focused on securing data in the cloud and on mobile devices. Santa Clara, Calif.-based Illumio, for example, founded earlier this year, is only hinting about what it will be doing in cloud security. But already it's the darling of Silicon Valley investors, pulling in over $42 million from backer Andreesen Horowitz, General Catalyst, Formation 8 and others. Read More


WHITE PAPER: AT&T

How to navigate the ever-changing mobile device landscape
Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful, and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information. Learn More

WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

Should the NSA be reformed? Fierce debate rages
There are now resounding calls to drastically change the secretive National Security Agency in the wake of the documents leaked by former NSA contractor Edward Snowden. Some advocate a completely re-made spy agency, others say moves that drastic would hurt national security. Read More

DOJ says Lavabit cannot prevent search warrants by 'locking its front gate'
Even after obtaining the encryption keys from secure email provider Lavabit through a court, the government was prevented by the court order and various laws from accessing other Lavabit users' accounts, the U.S. Department of Justice said Tuesday in a filing in an appeal by Lavabit. Read More


WEBCAST: IBM

Webinar: IBM IIM for Fraud, Abuse and Waste in Government
View this IBM webinar to learn about the challenges and opportunities in fraud reduction, waste, and abuse in government programs and agencies. You will learn how IBM Intelligent Investigation Manager (IIM) can help your organization. Learn More.

NASA: Kepler's most excellent space discoveries
NASA's Kepler space telescope continues to amaze Read More

Arbor Networks introduces cloud-based anti-DDoS service
Arbor Networks today introduced its first cloud-based distributed denial-of-service (DDoS) mitigation service to protect enterprises against large-scale attacks intended to swallow up available bandwidth or knock application servers offline. Read More


WHITE PAPER: F5 Networks

Post-TMG: Securing Internet Facing Microsoft Apps
Organizations currently using or considering Microsoft Forefront Threat Management Gateway (TMG) may face the dilemma of how, and what, administrators will use to secure Internet-facing Microsoft applications such as Exchange, SharePoint, and Lync with the departure of TMG. Read this paper to learn more about alternative solutions to Microsoft TMG. Read now>>

Banking malware infections rise to highest level since 2002
Malicious software aimed at stealing online banking credentials surged in the third quarter of this year to a level not seen since 2002, according to a new report from Trend Micro. Read More

Start-up Adallom takes on SaaS security monitoring/auditing
Start-up Adallom today introduced a cloud-based offering intended to help enterprises better monitor, audit and control use of software-as-a-service (SaaS) applications by employees. Read More

Start-up Sideband Networks models live network traffic to spot trouble
Start-up Sideband Networks today came out of stealth mode with an appliance that it says can model live traffic to give visibility into applications and user devices in order to solve performance problems. Read More

The quest for weak links in information security
A widely accepted definition of information security risk is the potential of a specific threat exploiting the vulnerabilities of an information asset, with the following formula used to represent information security risks: Risk = Likelihood x Impact. Read More


SLIDESHOWS

Recent iOS app updates people hate

We looked at the top 100 iPhone and iPad apps in the Business category, free or paid, that were last updated in September or October 2013 to find the ones users HATE.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Dual-Protocol Routing with Raspberry Pi

2. F5, VMware & Cisco: One happy family?

3. Riverbed wins 7-vendor WAN optimization test

4. 18 must-have Android productivity apps

5. IE zero-day attack delivers malware into memory then poofs on reboot

6. iPhone 6 rumor rollup for the week ending Nov. 8

7. Cisco claims scuttled by VMware

8. Top tools for WAN optimization

9. The hidden fangs of Windows 8.1 -- and how to avoid them

10. Georgia Tech warns of emerging threats in cloud, mobile


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: