Search This Blog

Tuesday, March 25, 2014

IT Leaders Share Tips on Managing Security Risks

15 (FREE!) security tools you should try | IP addy does not identify a person, judge tells copyright troll in BitTorrent case

Network World Security

Forward this to a Friend >>>


IT Leaders Share Tips on Managing Security Risks
Too much security -- or too little -- could bankrupt a company. These IT executives offer advice on finding the right balance. Read More


RESOURCE COMPLIMENTS OF: Quest

Achieve Deeper Network Security and Control
Next-generation firewalls (NGFWs) revolutionized network security. Traditional firewalls that only focus on stateful packet inspection and access control rules are ineffective in today's advanced-threat environment. To protect your organization from threats, your NGFW must be able to deliver a deeper level of network security. Learn why Dell™ SonicWALL™ NGFWs are the only firewalls capable of providing organizations of any size with the proper level of network security.

WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

15 (FREE!) security tools you should try
There's a long history of free security software, and here are some of the best-known products you can try inside your own network, if only to discover how vulnerable you are. Read More

IP addy does not identify a person, judge tells copyright troll in BitTorrent case
BitTorrent pirates, a Florida District Court Judge determined that an IP address does not identify a specific individual guilty of infringing. She then dismissed a copyright troll's case. This is considered an important ruling that may help set a trend that others will follow. Read More

In defense of Microsoft's leak investigation
By now, you've probably heard about the former Microsoft employee arrested for spilling trade secrets to a French website, and the impact it has had throughout the underground community that thrived on leaks. How Microsoft was able to get him might be trust-damaging to some, but not to me. Read More


WHITE PAPER: IBM

Intelligent Imaging for Improved Banking Performance
A new generation of "Intelligent Imaging" solutions has emerged that is helping banks remove the burden of paper in legacy processes, like loan origination and new account openings, while extending the power of document and data capture to achieve new levels of case management and business intelligence. Learn More

US Navy preps Black Box finder for Malaysia Flight 370 search
The US Navy is sending an emergency system that will help searchers find the Black Box of Malaysia Airlines Flight 370, which mysteriously disappeared March 8. The Navy system will help find the Black Box in the event a debris field of the plane is ever located. Read More

Rogue apps could exploit Android vulnerability to brick devices, researchers warn
A vulnerability in Android that was publicly disclosed in mid-March could be exploited by malicious applications to force devices into an endless reboot loop, according to security researchers from Trend Micro. Read More

Foundation to fight cybercrime by offering free advice on domain-name security
A newly formed non-profit called the Secure Domain Foundation (SDF) says its mission will be to provide free advice on security practices to protect the Internet's core infrastructure related to the Domain Name System. Read More


WHITE PAPER: HP and Intel® Xeon® processors

Bridging the IT Gap
To overcome today's IT management gap, your organization needs a fresh approach to infrastructure management. There are three key requirements for this new approach to IT management. In this paper, you'll find that three key requirements create the foundation for a management environment that is poised to meet the challenges of a new era in IT. Learn More

Palo Alto Networks buys endpoint security software maker Cyvera for $200M
Palo Alto Networks, known for its next-generation firewall, Monday said it is buying Israeli start-up Cyvera for about $200 million to gain access to its endpoint security product for real-time attack prevention. The deal is expected to close in a few weeks. Read More

Career Watch: The rise of people architecture
In managing human resources, people architecture is gaining popularity, says IT workforce analyst David Foote. He explains what it is and why it's on the rise. Read More

Your privacy is 'very important' says Microsoft after reading user's emails and IMs
After twice hacking Microsoft and vowing to publish proof of Microsoft "spying" on email accounts and selling user data to Johnny Law Officer, the Syrian Electronic Army went public with monthly invoices showing what Microsoft charges the FBI for user data. Read More

Encrypted email service Virtru adds Office 365 compatibility
Virtru has added Microsoft's Office 365 and Outlook Desktop services to its list of compatible email platforms for its encryption product. Read More


SLIDESHOWS

3D printing: How does it really work?

Here are the nine most common 3D printer technologies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco to launch $1B cloud service: report

2. iPhoneys: Apple iPhone 6 concepts

3. How 13 programming languages got their names

4. Quitting time: How to make a graceful exit

5. Feds call $1M IRS scam largest ever

6. Google Graveyard: Here's what Google has killed so far in 2014

7. Cisco gets fresh mid-range router competition

8. IDC: Cloud will be $107B industry by 2017

9. iPhone 6 rumor rollup for the week ending March 21

10. Microsoft's Lync surging as PBX choice in North America


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: