Search This Blog

Monday, November 04, 2013

The biggest challenges facing car crash prevention technologies

SecuriSync: cloud storage employees and IT admins will love | Eye-opening 'Morris worm' turns 25 tomorrow

Network World Security

Forward this to a Friend >>>


The biggest challenges facing car crash prevention technologies
There is a serious move toward adding ever-more technology to cars in an effort to reduce accidents that take 32,000 human lives a year and cause some 2 million injuries. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

WHITE PAPER: F5 Networks

Gaining Real-Time Protection with IP Perimeter Intelligence
Attack methodologies change. Threat vectors change. Once-powerful defenses become obsolete. As the pace of these changes increases, it's unrealistic to wait for defense methods to catch up, or for new products to be developed and releases pushed out. View Now

SecuriSync: cloud storage employees and IT admins will love
You may love Dropbox, but your IT admin likely hates it. Consumer cloud platforms create headaches for the folks who worry about the security of corporate data and what happens to files when a person leaves the company. Read More

Eye-opening 'Morris worm' turns 25 tomorrow
On Nov. 2, 1988, mainstream America learned for the first time that computers get viruses, too, as what would become known as the Morris worm - named for its author, Cornell University student Robert Tappan Morris - made front-page headlines after first making life miserable for IT professionals. Read More


WHITE PAPER: Kaspersky

Build Your IT Security Business Case
In this latest whitepaper from Kaspersky Lab, you'll find useful facts, examples and business case arguments to help you get buy-in and commitment from your business. Learn More.

New malware variant suggests cybercriminals targeting SAP users
A new variant of a Trojan program that targets online banking accounts also contains code to search if infected computers have SAP client applications installed, suggesting that attackers might target SAP systems in the future. Read More

Tech industry calls for 'oversight and accountability' of NSA surveillance
Internet companies in the U.S. are demanding that the surveillance practices of the U.S. should be reformed to enhance privacy protections and provide "appropriate oversight and accountability mechanisms." Read More


WEBCAST: ForeScout Technologies

Continuous Monitoring & Mitigation: the New InfoSec Frontier
Given network, device, access and threat dynamics, how can IT be more efficient and effective to identify and resolve exposures and attacks? This live broadcast brings together a panel of industry experts to discuss the advantages of leveraging controls and intelligence through a bi-directional integration. View now >>

The Department of Homeland Security and its obsolete Android OS problem
Patches and updates are a regular part of digital life. But apparently not regular enough, even among those who ought to know better -- public safety departments. Read More

Chrome browser will block malware downloads
Google has developed a security feature for Chrome that lets the browser detect and stop malware downloads. Read More


SLIDESHOWS

10 most powerful network management companies

Our look at the biggest players in the network management, um, world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Eye-opening 'Morris worm' turns 25 tomorrow

2. Fake social media ID duped security-aware IT guys

3. Gartner: Cloud-based security as a service set to take off

4. Raspberry Pi as a Network Monitoring Node

5. How the IETF plans to protect the web from NSA snooping

6. The Nexus 5 probably doesn't deserve all this hype

7. Cisco to release free standard software to boost Web videconferencing

8. Making sense of the Internet of Things

9. Monster bosses: Be very afraid

10. Defending Ubuntu, the latest recipient of a 'Big Brother' award


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: