Search This Blog

Tuesday, March 18, 2014

13 cool high-tech prize competitions

Hackers may leak Microsoft spying docs & grant Bill Gates' wish for 'intense debates' | HP makes printing easier, secure in BYOD environments

Network World Security

Forward this to a Friend >>>


13 cool high-tech prize competitions
The US government in 2011 or so realized that it could tap the techie conscience of the country by financially and legislatively backing good old-fashioned competition via the America Competes Act. That's the driving notion behind numerous public competitions, or challenges as they are often labeled, that have taken place since. Defense Advanced Research Projects Agency (DARPA), NASA, X Prize and others already knew the power of the public collection having pioneered the big tech competitions with myriad competitions about everything from space gloves and shredders to spacecraft. Here's a look at some of the coolest competitions going on now... Read More


WHITE PAPER: 8x8, Inc

SMB Disaster Recovery Strategies
Small and midsize businesses are finding a silver lining in cloud communications. Geographical diversity in communications and backup can keep a business up and running no matter the disaster so long as one employee can access a mobile phone or the Internet. Learn how to get your company back in business during a disaster. Learn more >>

WHITE PAPER: IBM

Pay-as-you-Grow Data Protection
IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions they need, and add new functionalities as they grow. Read Now

Hackers may leak Microsoft spying docs & grant Bill Gates' wish for 'intense debates'
It seemed surprising that no one asked Bill Gates about NSA surveillance when he last did a Reddit Ask Me Anything session last month; but Rolling Stone didn't pass up the opportunity when interviewing Bill Gates. Read More

HP makes printing easier, secure in BYOD environments
Using mobile devices for one-off printing tasks on office printers may not be a big deal, but Hewlett-Packard is trying to mitigate any security risk through direct wireless printing features it is bringing to enterprise printers. Read More

Google patches $310K worth of Chrome, Chrome OS bugs
Google on Friday patched several vulnerabilities in Chrome and Chrome OS within 48 hours of their disclosures at last week's Pwn2Own and Pwnium hacking contests. Read More


WHITE PAPER: HP

Building a Better Network Strategy
In today's global, always-on world, network security is crucial. This Slashdot Pulse offers insight into IT professionals who currently manage network security, giving readers a glimpse into real-word security plans and tactics. Learn More>>

8 ways to improve wired network security
We sometimes focus more on the wireless side of the network when it comes to security because Wi-Fi has no physical fences. After all, a war-driver can detect your SSID and launch an attack while sitting out in the parking lot. Read More

Without proper security measures, smart homes are just begging to be targets
As our world becomes increasingly connected via the Internet, it only seems logical that the interconnectivity would eventually permeate our homes. "Smart devices" like alarm systems, locks, thermostats, and more that can be controlled over the Internet are gradually gaining visibility and creating legions of "smart homes." For all the technological advancements, however, it would appear that our houses are simultaneously becoming more vulnerable. Read More

Cloud providers as cloud security providers
One of my observations from the RSA Conference this year was the continuing evolution of cloud providers into cloud security providers. Where it used to be said that security was one of the drags on cloud adoption, the fact is cloud providers have turned this argument on its head by becoming cloud security providers. Whether offering organic, homegrown solutions built into the platform or partnering... Read More


WHITE PAPER: HP

8 Ways To Monitor Network Security in the Age of BYOD
This SlashGuide offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce. Learn More>>

All major browsers fall during second day at Pwn2Own hacking contest
Security researchers demonstrated zero-day exploits against Google Chrome, Microsoft Internet Explorer, Apple Safari, Mozilla Firefox and Adobe Flash Player during the second day of the Pwn2Own hacking competition Thursday, racking up total prizes of US$450,000. Read More

Windows XP can put SOX, HIPAA, credit card security-compliance at risk
When Microsoft stops supporting Windows XP next month businesses that have to comply with payment card industry (PCI) data security standards as well as health care and financial standards may find themselves out of compliance unless they call in some creative fixes, experts say. Read More

How to avoid becoming a victim like Target
Target's failure to act when alerted that malware was in its network is a reminder that spending large amounts of money on technology is a waste without the right people and processes. Read More


SLIDESHOWS

12 hot cloud computing startups to watch: Product photo gallery

Cloud management, development, security and more.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. All major browsers fall during second day at Pwn2Own hacking contest

2. Snopes.com working overtime to debunk Flight 370 hoaxes

3. 3 easy Linux alternatives for Windows XP refugees who don't want a new PC

4. iPhone 6 rumor rollup for the week ending March 14

5. Cisco Unveils New Video Collaboration Products

6. Microsoft dangles $50 carrot in front of XP users

7. Neil deGrasse Tyson: What tech pros can learn from America's favorite scientist

8. Claim your slice of the $200MM DRAM settlement

9. Major companies, like Target, often fail to act on malware alerts

10. 11 tips to prepare for SDN


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: