Search This Blog

Wednesday, February 19, 2014

The 12 most powerful security companies

6 tips to combat Advanced Persistent Threats | Half million Belkin WeMo users could be hacked; CERT issues advisory

Network World Security

Forward this to a Friend >>>


The 12 most powerful security companies
Read More


WHITE PAPER: Dell Software

Anatomy Of A CyberAttack
Do you know how to keep cyber-criminals out of your network? Cyber-criminals employ complex techniques to avoid detection as they sneak into corporate networks to steal intellectual property. Don't give the bad guys the keys to your network. Learn how to protect your organization from emerging threats in our e-book. Read Now

WHITE PAPER: Dell Software

RocketSpace case study
In this case study, see how RocketSpace got both high security and high performance with Dell™ SonicWALL™ E-Class Network Security Appliance (NSA) E5500 Next-Generation Firewall with application intelligence, control and visualization. Read now!

6 tips to combat Advanced Persistent Threats
The success of advanced persistent threats (APT) is reportedly so pervasive that detecting and defeating them with any consistency may seem to be a hopeless battle. Read More

Half million Belkin WeMo users could be hacked; CERT issues advisory
When U.S. CERT comes knocking, it seems unwise for a company to stick its head in the sand and hide. Read More


WHITE PAPER: IBM

Introducing Social Business for the Mid-Market
This report provides directional guidance for mid-market companies to appropriately use Social Business to achieve their goals. Learn More.

Why security should monitor social media to prevent violence
The lone actor Read More

Why security pros should care about Bitcoin's troubles
Chief security officers who believe the latest Bitcoin problems do not affect them should think again. Securing such digital currency flowing through peer-to-peer payment systems may one day be the responsibility of security pros. Read More


WHITE PAPER: BMC Software

Forrester Workload Automation Paper commissioned by BMC
In "Industrializing IT Workload Automation," Forrester Consulting and BMC Software analyze the results of a comprehensive survey that addressed job scheduling on the ground today. Read Now!

McAfee plans enterprise security package for fast threat detection and response
McAfee says it's developing a product it calls "Threat Intelligence Exchange," which it expects to introduce by mid-year as a core means to garner information about cyber-attacks and response for the enterprise. Read More

Zeus banking malware nestles a crucial file in a photo
A newly discovered variant of the notorious Zeus banking trojan is disguising a crucial configuration code in a digital photo, a technique known as steganography. Read More

Exploit released for vulnerability targeted by Linksys router worm
Technical details about a vulnerability in Linksys routers that's being exploited by a new worm have been released Sunday along with a proof-of-concept exploit and a larger than earlier expected list of potentially vulnerable device models. Read More

The simple way to stop serious Microsoft software flaws? Take away 'admin' rights
Running Windows users with 'standard' rather than 'administrator' rights would have removed over 90 percent of the risk posed by critical vulnerabilities reported in Microsoft products last year, an analysis by privilege management firm Avecto has found. Read More


SLIDESHOWS

The 12 most powerful security companies

Some security vendors just keep getting high marks from independent test organizations and analysts year and year.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Whatever happened to the IPv4 address crisis?

2. 16 weirdest places you'll find Linux

3. Experts question security used in Target breach

4. 10-Gbit Google Fiber is already real, just not from Google

5. Windows XP isn't the only software getting the knife in 8 weeks

6. Apple shop maxes out Airport access points, upgrades to 802.11ac

7. iPhone 6 rumor rollup for the week ending Feb. 14

8. Memory glitch hits Cisco's Q2

9. So Long IT Specialist, Hello Full-Stack Engineer

10. Worm 'TheMoon' infects Linksys routers


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: