Search This Blog

Monday, December 30, 2013

Senators call on FTC to investigate Target breach

Cloud-based security services poised for rapid growth | Security researcher cancels talk at RSA conference in protest

Network World Security

Forward this to a Friend >>>


Senators call on FTC to investigate Target breach
A U.S. senator has called on the Federal Trade Commission to investigate Target's security practices after the large retailer reported a data breach affecting 40 million customer credit and debit cards. Read More


WHITE PAPER: Cisco and Netapp

Total Economic Impact Of FlexPod Data Center Platform
FlexPod is a data center platform jointly developed by NetApp and Cisco that delivers networking, computing and storage. This Forrester report offers key findings from Forrester's interviews with FlexPod customers. View Now

WEBCAST: IBM

Business Value of Creating Exceptional Digital Experiences
Watch this on-demand webcast to review the findings of IDC's recent analytical report titled: "The Business Value of IBM's Exceptional Digital Experience Solutions." Learn More

Cloud-based security services poised for rapid growth
The rush of businesses to move their operations to the cloud is creating a slipstream that's pulling security services into the nimbus. Read More

Security researcher cancels talk at RSA conference in protest
Security researcher Mikko Hypponen has canceled his talk at a RSA security conference in San Francisco, reacting to a report that the security division of EMC allegedly received US$10 million from the U.S. National Security Agency to use a flawed random number generator in one of its products. Read More

The weirdest, wackiest and coolest sci/tech stories of 2013
From bathroom malware and the mystery Google barge to Chinese Moon landings and humanoid robots it has been one wacky high-tech year Read More


WEBCAST: Solutionary, Inc.

Information Security: Options for Threat Detection
This webcast will identify the pros and cons of an on-premise SIEM and an MSSP approach, as well as provide an overview of financial, operational and organizational considerations that purchasers of security solutions may wish to consider. Learn More.

The worst tech predictions of 2013 -- and two that hit the mark
From the social network in business to the 'success' of the Chromebook to the launch of iTV, the pundits got it wrong, wrong, wrong Read More

Tech's biggest flops, fails, and faux pas of 2013
Read More

U.S. government moves to block further litigation in NSA surveillance cases
The U.S. government again claimed state-secrets privileges in a move to block two lawsuits challenging the constitutionality of the National Security Agency's monitoring of Americans' phone communications and email, according to court filings late Friday. Read More


WHITE PAPER: New Relic

Secure, Reliable & Proven APM for the Enterprise
Your organization depends on your web applications to do business -- from customer facing eCommerce,banking or travel applications, to mission-critical applications for your employees or partners. When it comes to performance, visitors' expectations for service and reliability are high. Read Now

2013's 25 Geekiest 25th Anniversaries
Network World's 7th annual collection of the year's "25 Geekiest 25th Anniversaries" includes the invention of Doppler Radar, the introduction of IBM's AS/400, the scourge of the Morris worm, the publishing of Stephen Hawking's "A Brief History of Time", as well as "America's Finest News Source:" The Onion. Read More

Tech hoaxes, scams, urban legends, and practical jokes
You can't believe everything you read on the Internet. Yet so many people do! Read More

The biggest Internet security challenges of 2013
From the attack on privacy and Cryptolocker to Eric Snowden and the NSA, it's been a challenging year Read More


SLIDESHOWS

10 best Android smartphones of 2013

2013 was a big year for the Android smartphone ecosystem.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 10 best Android smartphones of 2013

2. Report on NSA 'secret' payments to RSA fuels encryption controversy

3. Inside knowledge likely in Target breach, experts say

4. 10 ex-Cisco employees making an impact in the industry

5. 'PGP' encryption has had stay-powering but does it meet today's enterprise demands?

6. Juniper vs. Palo Alto Networks: Firewall court battle set to begin

7. What's Microsoft going to look like after Ballmer?

8. Notable deaths of 2013 from the worlds of technology, science & inventions

9. Bah humbug. IT pros expect to work over holiday break

10. Cisco teams with VMware, Citrix to counter Amazon's new cloud-based desktop


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: