Search This Blog

Wednesday, March 26, 2014

(Free!) Security Tools you should try

Network World Security - Newsletter - networkworld.com
Trial Microsoft software and services – for FREE! | In rare move, banks sue Target's security auditor

Network World Security

Forward this to a Friend >>>


(Free!) Security Tools you should try
Who doesn't like free stuff? There's a long tradition of free or open-source security tools, and one of the best sites to learn more about them is Security Tools, a running list of what it claims are the 125 best free security tools around. Read More


RESOURCE COMPLIMENTS OF: CSO40 Security Confab + Awards Conference

FINAL DAYS to Register: CSO40 Security Confab + Awards
Please join us this March 31 – April 2, 2014 for CSO40 Security Confab + Awards. Our program of fast-moving, rapid fire presentations delivered by leading CSO and CISO thought leaders demonstrate how forward-thinking organizations are embracing today's challenges and preparing for the future. Register now.

RESOURCE COMPLIMENTS OF: SolarWinds

Tales from the Dark Side of the Network
Frustrated with your big IT Network Management System? In this exclusive footage, IT pros tell their side of the story...the dark side. Let SolarWinds ® Software bring light to the darkness. Save Time. Save Money. Save the Network with SolarWinds Network Performance Monitor. Watch now and don't let inefficient network management systems take your team to the dark side.

Trial Microsoft software and services – for FREE!
Microsoft gives potential customers the chance to test drive some of its most popular software and services via free trials that ultimately make for better buying decisions. Read More

In rare move, banks sue Target's security auditor
Two banks that claim to have suffered losses from the recent data breach at Target have sued Trustwave Holdings Inc., the company that was responsible for validating Target's compliance with the Payment Card Industry Data Security Standard. Read More

Cyber black markets on darknets: More profitable than the illegal drug trade.
Read More

I'm from security, may I see your earwax?
Read More


WHITE PAPER: ForeScout Technologies

2014 Cyberthreat Defense Report for North America & Europe
The Cyberthreat Defense Report is based on a rigorous survey of IT security decision makers and practitioners across North America and Europe. It reveals the current and planned deployment of technological countermeasures. Learn more >>

Security Vendors Are Racing Toward a New Anti-malware Technology Model
While the calendar still indicates that we are in Q1 2014, the security industry continues as a nexus of M&A activity. The year started with FireEye grabbing Mandiant, and proceeded to Bit9's merger with Carbon Black, and yesterday's announcement that Palo Alto's intent to acquire Cyvera. Read More

ATM malware, controlled by a text message, spews cash
A group of enterprising cybercriminals have figured out how to get cash from a certain type of ATM -- by text message. Read More

Info sec industry still struggles to attract women
Even as women have made dramatic advances in medicine, law, and other fields, the proportion of women pursuing undergraduate degrees in the computer sciences has actually been dropping, from around 30 percent in 1990 to 18 percent in 2010, according to the latest data from the National Science Foundation. As a result, according to the Census Bureau, women accounted for just 27 percent of computer science professionals -- down from 34 percent in 1990. Read More

Artificial Intelligence challenge: Could a robot give its own TED talk?
Without a doubt the most presentations and presenters for that matter at any given TED conference deliver leading edge material. And now that group - who's tag line if "Ideas worth Spreading" - wants to make them even more advanced by challenging the Artificial Intelligence community to develop a thinking robot to deliver a TED presentation. Read More


WHITE PAPER: ExaGrid

How Data Deduplication Impacts Recovery
Data deduplication has clear benefits when it comes to efficiently retaining backup data on disk and replicating data offsite for disaster recovery – you save both disk space and bandwidth by employing deduplication. Learn More

Melissa virus turning 15 … (age of the stripper still unknown)
(Note: This Buzzblog item was originally posted on March 24, 2009. It's been altered here only to reflect the passage of another five years.) Somewhere out there in America is a stripper (or former stripper) who for 15 years has lived with the naked truth that she was David L. Smith's inspiration for naming the first widely destructive, self-propagating, network-paralyzing, e-mail-borne macro virus:... Read More

Cybercrime trends point to greater sophistication, stealthier malware, more encryption
A sobering think-tank report on the evolution of cybercrime and the supporting marketplaces on the dark side of the Internet depicts a criminal complex growing more sophisticated in software tools and its ability to hide from law enforcement. Read More

Security Chalk Talk: What is a rootkit?
Security Chalk Talk: What is a rootkit? Most rootkits today are bundled with malware such as key loggers, or they take control of the system as a zombie member of a botnet to launch other attacks. ... From: Network World Views: 0 0 ratings Time: 16:06 More in Science & Technology Read More

IRS: Bitcoin is property not money
The IRS today tried to clear up some of the ongoing row about how bitcoin and other virtual currencies would be treated come tax time. Read More


SLIDESHOWS

3D printing: How does it really work?

Here are the nine most common 3D printer technologies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. ATM malware, controlled by a text message, spews cash

2. 3D printing: How does it really work?

3. Cisco's big about-face on cloud services

4. (Free!) Security Tools you should try

5. IP address does not identify a person, judge tells copyright troll in BitTorrent case

6. Dell unveils fabric switch, SDN controller

7. Quitting time: How to make a graceful exit

8. Ubuntu phone isn't important enough to demand an open source baseband

9. 15 (FREE!) security tools you should try

10. Cisco's $1 billion bet on the cloud may pay off


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: