Search This Blog

Monday, February 24, 2014

“Cold” Topics at RSA that Should Receive More Attention

IRS warns on 'Dirty Dozen' tax scams for 2014 | DARPA wants to automate Big Data findings to solve complicated problems

Network World Security

Forward this to a Friend >>>


"Cold" Topics at RSA that Should Receive More Attention
In my blog yesterday, I outlined the hot topics I anticipate at this year's RSA Security Conference. Since the show is dominated by security vendors, the show hype will focus on products, services, and various technologies. Read More


WHITE PAPER: PC Connection | Cisco | Intel®

Overcoming the Security Challenges of the Cloud
PC Connection, in partnership with Cisco and Intel®, recently conducted a survey to learn how organizations are using the cloud. In this white paper, you'll learn what you can do to mitigate security concerns and make the most out of the cloud. View Now

WHITE PAPER: IBM

Streamline Data Protection with Storage Manager
IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup and Restore, TSM is a far more comprehensive data-protection solution. Read Now

IRS warns on 'Dirty Dozen' tax scams for 2014
Everybody wants your money – the IRS too, but at least they will take it legally. The IRS however doesn't want your money taken by scamsters who use tax season to celebrate Christmastime for dirtbags. Read More

DARPA wants to automate Big Data findings to solve complicated problems
Gaining significant knowledge from the growing tons of information available about big picture topics such as biology, economics, astronomy, health or climate is a challenge beyond most human minds and computer programs. Read More


WHITE PAPER: Dell Software

A New Set Of Network Security Challenges
IT faces conflicting mandates from the business. On one hand, employees demand access from devices beyond the firewall such as smartphones, tablets, home PCs and laptops. On the other hand, risk management dictates corporate data must remain protected. The overarching challenge: balance productivity and security. A Must Read!

Beware of employees' cheap Android phones
An Android vulnerability known since 2012 has recently been found to be more serious than previously thought, particularly in phones that cost less than $150. Read More

Why companies need to check their handling of internal threats
Security pros should reevaluate their use of technology and policies to bolster defenses against insider threats that many organizations downplay, a new study shows. Read More


WHITE PAPER: IBM

Pay-as-you-Grow Data Protection
IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions they need, and add new functionalities as they grow. Read Now

Microsoft delivers stopgap defense against active IE10 attacks
Microsoft on Wednesday issued a stopgap defense that protects IE9 and IE10 against ongoing attacks until the company issues a patch, probably in three weeks. Read More

One tweak can make your Windows PC virtually invulnerable
Microsoft published 147 vulnerabilities in 2013 that were rated as Critical. Critical, however, is a relative term, and there is one simple thing anyone can do that would guard against almost every single Critical vulnerability according to a new report from Avecto. Read More


SLIDESHOWS

The 12 most powerful security companies

Some security vendors just keep getting high marks from independent test organizations and analysts year and year.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Juniper unveils new operating plan to accelerate growth

2. Demand for Linux skills rises

3. Leaked release dates shed light on Microsoft's Windows 9 plans

4. IRS warns on 'Dirty Dozen' tax scams for 2014

5. Juniper, Nokia hooking up?

6. Whatever happened to the IPv4 address crisis?

7. Products to watch for at Mobile World Congress 2014

8. Microsoft Lync gathers data just like NSA vacuums up info in its domestic surveillance program

9. The 12 most powerful security companies

10. Cisco fixes unauthorized access, denial-of-service flaws in several products


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: