Search This Blog

Wednesday, February 26, 2014

RSA chief: NSA exploited 'position of trust'; should spin-out security tech group

AT&T and IBM cement security partnership | Apple patches critical 'gotofail' bug with Mavericks update

Network World Security

Forward this to a Friend >>>


RSA chief: NSA exploited 'position of trust'; should spin-out security tech group
Did the National Security Agency trick RSA, the security division of EMC, into including a crypto algorithm that was really an NSA cyber-espionage backdoor into the RSA BSAFE toolkit in order to propagate it through tech industry products? Read More


RESOURCE COMPLIMENTS OF: Juniper Networks

Meet the Future of Data Center Security
The data center is under attack by constant, evolving security threats. New threats call for a new approach. Juniper Networks security solutions employ intrusion deception technology based on three principles: know the threat is real, control attackers' actions and expose their device information to a global database. Play the game. Deploy the solution. Save the future. It begins at DeceptionForce.org

WHITE PAPER: PC Connection | Cisco | Intel®

Overcoming the Security Challenges of the Cloud
PC Connection, in partnership with Cisco and Intel®, recently conducted a survey to learn how organizations are using the cloud. In this white paper, you'll learn what you can do to mitigate security concerns and make the most out of the cloud. View Now

AT&T and IBM cement security partnership
AT&T and IBM, at the RSA Conference, announced they've sealed a partnership to provide security services for a wide range of enterprises in a way that blends technology and professional services both vendors have. Read More

Apple patches critical 'gotofail' bug with Mavericks update
Apple today updated OX Mavericks, plugging the embarrassing security hole the Cupertino, Calif. company left wide open in the operating system's implementation of basic Internet encryption. Read More


WHITE PAPER: IBM

Streamline Data Protection with Storage Manager
IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup and Restore, TSM is a far more comprehensive data-protection solution. Read Now

Will software eat the security industry?
Well the first day of RSA week is in the books and things are off to a rousing start. My day started early today as I was the moderator of a great panel at the Americas Growth Capital Conference. My panel was on Security Automation. Read More

Check Point unveils security architecture for threat-intelligence sharing
Check Point Software Technologies today said it is extending its security architecture to be able to incorporate more threat-intelligence data that could be shared with other vendor partners, with the goal of providing more adaptive prevention. Read More


WHITE PAPER: IBM

Pay-as-you-Grow Data Protection
IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions they need, and add new functionalities as they grow. Read Now

NASA space photo shows incredible light disparity between North and South Korea
The International Space Station recently took a snapshot of the Korean peninsula that explicitly details the night-time power consumption of North and South Korea - North Korea is almost completely dark. Read More

7 hidden dangers of wearable computers
Wearable computers like smart clothes and smart watches offer a myriad of benefits, but also raise security concerns. Here are 7 worries associated with wearable devices. Read More

Video: Another cybersecurity gap: filling jobs
Security experts weigh in on the shortage of cybersecurity workers and what can be done to close the skills gap. Read More

Mac users warned against using public Wi-Fi networks
Connecting to unsecured networks not advisable for Apple users until patch is released for vulnerability Read More


SLIDESHOWS

Free tools for Windows Server admins

There are endless software tools and utilities out there to help you in managing your network. Here are some of the best free ones.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPhone 6 rumor rollup for the week ending Feb. 21

2. DARPA wants to scrub scourge of counterfeit computer gear

3. US carriers said to have rejected 'kill switch' technology last year

4. Google Easter egg leads to story behind 'blink' tag

5. Free tools for Windows Server admins

6. 6 lessons learned about the scariest security threats

7. Whatever happened to the IPv4 address crisis?

8. First look: Mozilla's new lineup of Firefox OS devices

9. AT&T and IBM cement security partnership

10. IBM bets $1 billion on PaaS to boost cloud apps


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: